Sciweavers

144 search results - page 20 / 29
» informaticalt 2006
Sort
View
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
13 years 8 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 8 months ago
An Electronic Cash System Based on Group Blind Signatures
One important requirement of electronic cash systems is the anonymity of customers. Unconditional anonymity is also very well suited to support criminals in blackmailing. Maitland ...
Constantin Popescu
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
13 years 8 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...
INFORMATICALT
2006
96views more  INFORMATICALT 2006»
13 years 8 months ago
Evaluation of Ranking Accuracy in Multi-Criteria Decisions
The paper analyses the problem of ranking accuracy in multiple criteria decision-making (MCDM) methods. The methodology for measuring the accuracy of determining the relative signi...
Edmundas Kazimieras Zavadskas, Algimantas Zakarevi...
INFORMATICALT
2006
154views more  INFORMATICALT 2006»
13 years 8 months ago
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors
Matrix transpose in parallel systems typically involves costly all-to-all communications. In this paper, we provide a comparative characterization of various efficient algorithms f...
Rami Al Na'mneh, W. David Pan, Seong-Moo Yoo