Sciweavers

122 search results - page 5 / 25
» The First Report on Scheme Revisited
Sort
View
IEEEIAS
2009
IEEE
13 years 7 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
IADIS
2004
13 years 11 months ago
A Scheme for Approximate Matching Event Announcements to a Customer Database
An event is a short and data-rich document and it refers to an instance of an announcement type such as "wedding", "birth", "graduation", "aucti...
Ray R. Hashemi, John R. Talburt
PR
2006
87views more  PR 2006»
13 years 10 months ago
Prototype reduction schemes applicable for non-stationary data sets
All of the prototype reduction schemes (PRS) which have been reported in the literature, process time-invariant data to yield a subset of prototypes that are useful in nearest-nei...
Sang-Woon Kim, B. John Oommen
HCI
2009
13 years 7 months ago
Common Interaction Schemes for In-Vehicle User-Interfaces
Abstract. In this paper different interaction schemes which are currently implemented by major automotive manufacturers have been identified and analyzed. Complete overviews on all...
Simon Nestler, Marcus Tönnis, Gudrun Klinker
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin