Sciweavers

154 search results - page 31 / 31
» rsa 2006
Sort
View
CIKM
2006
Springer
13 years 11 months ago
CP/CV: concept similarity mining without frequency information from domain describing taxonomies
Domain specific ontologies are heavily used in many applications. For instance, these form the bases on which similarity/dissimilarity between keywords are extracted for various k...
Jong Wook Kim, K. Selçuk Candan
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue
DELTA
2006
IEEE
13 years 11 months ago
Modified Montgomery Modular Multiplication Using 4: 2 Compressor and CSA Adder
The efficiency of the Public Key encryption systems like RSA and ECC can be improved with the adoption of a faster multiplication scheme. In this paper, Modified Montgomery multip...
Himanshu Thapliyal, Anvesh Ramasahayam, Vivek Redd...
ENVSOFT
2006
125views more  ENVSOFT 2006»
13 years 7 months ago
Sensitivity analysis based on regional splits and regression trees (SARS-RT)
A global sensitivity analysis with regional properties is introduced. This method is demonstrated on two synthetic and one hydraulic example. It can be shown that an uncertainty a...
Florian Pappenberger, Ion Iorgulescu, Keith J. Bev...