Sciweavers

206 search results - page 6 / 42
» Use of Chinese Short Messages
Sort
View
ICCPOL
2009
Springer
13 years 12 months ago
Constructing Parallel Corpus from Movie Subtitles
Abstract. This paper describes a methodology for constructing aligned German-Chinese corpora from movie subtitles. The corpora will be used to train a special machine translation s...
Han Xiao, Xiaojie Wang
FC
2005
Springer
171views Cryptology» more  FC 2005»
14 years 27 days ago
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
Abstract. We firstly proposed a new notion of short identity-based signature scheme. We argue that the identity-based environment is essential in some scenarios. The notion of sho...
Fangguo Zhang, Willy Susilo, Yi Mu
IJNSEC
2011
108views more  IJNSEC 2011»
13 years 2 months ago
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
We first analyze the security of a short signature scheme without random oracles called ZCSM scheme and point out that it cannot support unforgeable under the chosen message and ...
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li...
ISI
2003
Springer
14 years 17 days ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
13 years 11 months ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...