Sciweavers

9 search results - page 2 / 2
» A note on tall cardinals and level by level equivalence
Sort
View
PKC
2005
Springer
94views Cryptology» more  PKC 2005»
13 years 10 months ago
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
In this paper, we first introduce a new kind of adversarial goal called forge-and-impersonate in undeniable signature schemes. Note that forgeability does not necessarily imply im...
Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
TON
2008
139views more  TON 2008»
13 years 5 months ago
Stochastic learning solution for distributed discrete power control game in wireless data networks
Distributed power control is an important issue in wireless networks. Recently, noncooperative game theory has been applied to investigate interesting solutions to this problem. Th...
Yiping Xing, Rajarathnam Chandramouli
SICHERHEIT
2008
13 years 6 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
BMCBI
2005
94views more  BMCBI 2005»
13 years 5 months ago
Reproducible Clusters from Microarray Research: Whither?
Motivation: In cluster analysis, the validity of specific solutions, algorithms, and procedures present significant challenges because there is no null hypothesis to test and no &...
Nikhil R. Garge, Grier P. Page, Alan P. Sprague, B...