Sciweavers

892 search results - page 66 / 179
» et 2007
Sort
View
AMC
2005
138views more  AMC 2005»
13 years 8 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim
AMC
2005
172views more  AMC 2005»
13 years 8 months ago
An efficient nonce-based authentication scheme with key agreement
In this paper, we propose a cost effective mutual authentication scheme with key agreement using smart cards. Our scheme is motivated by the scheme design in two articles publishe...
Yen-Cheng Chen, Lo-Yao Yeh
JCP
2007
122views more  JCP 2007»
13 years 8 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
CIE
2007
Springer
14 years 3 months ago
Circuit Complexity of Regular Languages
We survey our current knowledge of circuit complexity of regular languages and we prove that regular languages that are in AC0 and ACC0 are all computable by almost linear size ci...
Michal Koucký
DIS
2007
Springer
14 years 3 months ago
On Approximating Minimum Infrequent and Maximum Frequent Sets
The maximum cardinality of a frequent set as well as the minimum cardinality of an infrequent set are important characteristic numbers in frequent (item) set mining. Gunopulos et a...
Mario Boley