Sciweavers

1282 search results - page 103 / 257
» Signing on signing off
Sort
View
AMC
2005
124views more  AMC 2005»
13 years 9 months ago
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. const...
Narn-Yih Lee, Ming-Feng Lee
CG
2002
Springer
13 years 9 months ago
Visualising chaos in a model of brain electrical activity
It is a major source of contention in brain dynamics as to whether the electrical rhythms of the brain show signs of chaos. Here we discuss evidence for the existence of chaos in ...
Mathew P. Dafilis, Paul D. Bourke, David T. J. Lil...
TC
1998
13 years 9 months ago
Comments on Duprat and Muller's Branching CORDIC Paper
In [1], Duprat and Muller introduced the ingenious “Branching CORDIC” algorithm. It enables a fast implementation of CORDIC algorithm using signed digits and requires a consta...
Dhananjay S. Phatak
SIGOPS
2002
88views more  SIGOPS 2002»
13 years 9 months ago
A pragmatic alternative to undetachable signatures
A `pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were introduced by Sander and Tschudin, [4], as a means of giving a mobile agent the...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
TIFS
2010
186views more  TIFS 2010»
13 years 7 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang