Sciweavers

380 search results - page 26 / 76
» Time Capsule Signature
Sort
View
LISA
2008
13 years 10 months ago
Automatic Software Fault Diagnosis by Exploiting Application Signatures
Application problem diagnosis in complex enterprise environments is a challenging problem, and contributes significantly to the growth in IT management costs. While application pr...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
14 years 9 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
ERCIMDL
2008
Springer
107views Education» more  ERCIMDL 2008»
13 years 10 months ago
Revisiting Lexical Signatures to (Re-)Discover Web Pages
A lexical signature (LS) is a small set of terms derived from a document that capture the "aboutness" of that document. A LS generated from a web page can be used to disc...
Martin Klein, Michael L. Nelson
SCN
2008
Springer
126views Communications» more  SCN 2008»
13 years 8 months ago
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification
We consider the task of computing power productsQ 1ik gei i ("multi-exponentiation") where base elements g2, . . ., gk are fixed while g1 is variable between multi-expone...
Bodo Möller, Andy Rupp
IACR
2011
173views more  IACR 2011»
12 years 8 months ago
All-But-Many Lossy Trapdoor Functions
We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can...
Dennis Hofheinz