Sciweavers

1282 search results - page 176 / 257
» Signing on signing off
Sort
View
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
14 years 11 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
PKC
2009
Springer
121views Cryptology» more  PKC 2009»
14 years 11 months ago
On the Theory and Practice of Personal Digital Signatures
We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent pla...
Gert Læssøe Mikkelsen, Ivan Damg&arin...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 11 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
RECOMB
2007
Springer
14 years 11 months ago
How to Achieve an Equivalent Simple Permutation in Linear Time
The problem of Sorting signed permutations by reversals is a well studied problem in computational biology. The first polynomial time algorithm was presented by Hannenhalli and Pev...
Simon Gog, Martin Bader
RECOMB
2006
Springer
14 years 11 months ago
Inferring Positional Homologs with Common Intervals of Sequences
Inferring orthologous and paralogous genes is an important problem in whole genomes comparisons, both for functional or evolutionary studies. In this paper, we introduce a new appr...
Guillaume Blin, Annie Chateau, Cedric Chauve, Yann...