Sciweavers

15375 search results - page 119 / 3075
» cans 2008
Sort
View
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 8 months ago
Repairing Efficient Threshold Group Signature Scheme
To enhance the efficiency of threshold group signature schemes, Yu and Chen, recently, proposed an efficient threshold group signature scheme. By using elliptic curves, the propos...
Zuhua Shao
IS
2008
13 years 8 months ago
On the expressibility of functions in XQuery fragments
XQuery is a powerful XML query language with many features and syntactic constructs. For many common queries we do not need all the expressive power of XQuery. We investigate the ...
Jan Hidders, Stefania Marrara, Jan Paredaens, Roel...
JCM
2008
74views more  JCM 2008»
13 years 7 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
JCM
2008
138views more  JCM 2008»
13 years 7 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
JEI
2008
307views more  JEI 2008»
13 years 7 months ago
Recall or precision-oriented strategies for binary classification of skin pixels
Skin detection is a preliminary step in many applications. We analyze some of the most frequently cited binary skin classifiers based on explicit color cluster definition and prese...
Francesca Gasparini, Silvia Corchs, Raimondo Schet...