Sciweavers

INFORMATICALT
2010
102views more  INFORMATICALT 2010»
13 years 8 months ago
An Computation-Efficient Generalized Group-Oriented Cryptosystem
A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the me...
Ting-Yi Chang
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
13 years 8 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
INFORMATICALT
2010
134views more  INFORMATICALT 2010»
13 years 8 months ago
Observability of Turing Machines: A Refinement of the Theory of Computation
The Turing machine is one of the simple abstract computational devices that can be used to investigate the limits of computability. In this paper, they are considered from several ...
Yaroslav D. Sergeyev, Alfredo Garro
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
13 years 8 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
INFORMATICALT
2010
102views more  INFORMATICALT 2010»
13 years 8 months ago
Closed-Loop System Identification with Modifications of the Instrumental Variable Method
Least-squares method is the most popular method for parameter estimation. It is easy applicable, but it has considerable drawback. Under well-known conditions in the presence of no...
Nasko Atanasov, Alexander Ichtev
INFORMATICALT
2010
107views more  INFORMATICALT 2010»
13 years 8 months ago
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
Abstract. In 2008, based on the two-party Diffie
Yuh-Min Tseng, Tsu-Yang Wu
INFORMATICALT
2010
112views more  INFORMATICALT 2010»
13 years 8 months ago
Recursive Identification of Systems with Noninvertible Output Nonlinearities
Abstract. The paper deals with the recursive identification of dynamic systems having noninvertible output characteristics, which can be represented by the Wiener model. A special ...
Jozef Vörös
INFORMATICALT
2010
103views more  INFORMATICALT 2010»
13 years 8 months ago
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme
In 2007, Kancharla et al. proposed an identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and claimed it unforgeable and non-delegatable...
Xun Sun, Jianhua Li, Hu Yin, Gongliang Chen
INFORMATICALT
2010
91views more  INFORMATICALT 2010»
13 years 10 months ago
An Expansion of the Neural Network Theory by Introducing Hebb Postulate
In the presented paper, some issues of the fundamental classical mechanics theory in the sense of Ising physics are introduced into the applied neural network area. The expansion o...
Algis Garliauskas
INFORMATICALT
2010
131views more  INFORMATICALT 2010»
13 years 10 months ago
Extended Software Architecture Based on Security Patterns
One of the major activities in software design is defining software architecture. Before designing software structure and software behavior we have to define its architecture. In...
Dusan Savic, Dejan Simic, Sinisa Vlajic