Sciweavers

376 search results - page 46 / 76
» Year 2000
Sort
View
ASIACRYPT
2000
Springer
14 years 4 hour ago
Unconditionally Secure Digital Signature Schemes Admitting Transferability
A potentially serious problem with current digital signature schemes is that their underlying hard problems from number theory may be solved by an innovative technique or a new gen...
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hi...
ASIACRYPT
2000
Springer
14 years 3 hour ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
CIA
2000
Springer
14 years 1 hour ago
Applying Agents to Bioinformatics in GeneWeaver
Recent years have seen dramatic and sustained growth in the amount of genomic data being generated, including in late 1999 the first complete sequence of a human chromosome. The c...
Kevin Bryson, Michael Luck, Mike Joy, David T. Jon...
DSOM
2000
Springer
13 years 12 months ago
Evaluation of Constrained Mobility for Programmability in Network Management
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobilit...
Christos Bohoris, Antonio Liotta, George Pavlou
CICLING
2006
Springer
13 years 11 months ago
A General and Multi-lingual Phrase Chunking Model Based on Masking Method
Several phrase chunkers have been proposed over the past few years. Some state-of-the-art chunkers achieved better performance via integrating external resources, e.g., parsers and...
Yu-Chieh Wu, Chia-Hui Chang, Yue-Shi Lee