Sciweavers

266 search results - page 26 / 54
» Tracing-by-Linking Group Signatures
Sort
View
ASIACRYPT
2001
Springer
14 years 3 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
ACISP
2006
Springer
14 years 2 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
13 years 8 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
14 years 19 hour ago
Behavior-based speciation for evolutionary robotics
This paper describes a speciation method that allows an evolutionary process to learn several robot behaviors using a single execution. Species are created in behavioral space in ...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...
AINA
2005
IEEE
14 years 4 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...