Sciweavers

CJ
2006
78views more  CJ 2006»
14 years 15 days ago
Protecting Users against Phishing Attacks
Engin Kirda, Christopher Krügel
CJ
2006
52views more  CJ 2006»
14 years 15 days ago
High Assurance Software Systems
Ing-Ray Chen, Bojan Cukic
CJ
2006
100views more  CJ 2006»
14 years 15 days ago
Fuzzifying P Systems
Abstract. Uncertainty is an inherent property of all living systems. Curiously enough, computational models inspired by biological systems do not take, in general, under considerat...
Apostolos Syropoulos
CJ
2006
67views more  CJ 2006»
14 years 15 days ago
Processing Distance Join Queries with Constraints
Apostolos N. Papadopoulos, Alexandros Nanopoulos, ...
CJ
2006
123views more  CJ 2006»
14 years 15 days ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
CJ
2006
100views more  CJ 2006»
14 years 15 days ago
Deterministic Identity-Based Signatures for Partial Aggregation
Aggregate signatures are a useful primitive which allows to aggregate into a single and constant-length signature many signatures on different messages computed by different users...
Javier Herranz
CJ
2006
78views more  CJ 2006»
14 years 15 days ago
A Very Mathematical Dilemma
Mathematics is facing a dilemma at its heart: the nature of mathematical proof. We have known since Church and Turing independently showed that mathematical provability was undeci...
Alan Bundy
CJ
2006
66views more  CJ 2006»
14 years 15 days ago
Improved Algorithms for the K-Maximum Subarray Problem
Sung Eun Bae, Tadao Takaoka
CJ
2006
107views more  CJ 2006»
14 years 15 days ago
Automated Unique Input Output Sequence Generation for Conformance Testing of FSMs
Karnig Derderian, Robert M. Hierons, Mark Harman, ...