Sciweavers

31 search results - page 3 / 7
» icic 2007
Sort
View
ICIC
2007
Springer
13 years 11 months ago
Human-Like Learning Methods for a "Conscious" Agent
In most contexts, learning is essential for the long-term autonomy of an agent. We describes here some essential and fundamental learning mechanisms implemented in a cognitive auto...
Usef Faghihi, Daniel Dubois, Mohamed Gaha, Roger N...
ICICS
2007
Springer
13 years 11 months ago
(Convertible) Undeniable Signatures Without Random Oracles
We propose a convertible undeniable signature scheme without random oracles. Our construction is based on the Waters signatures proposed in Eurocrypt 2005. The security of our sche...
Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susi...
ICICS
2007
Springer
13 years 11 months ago
Extending FORK-256 Attack to the Full Hash Function
Abstract. In a paper published in FSE 2007, a way of obtaining nearcollisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained ex...
Scott Contini, Krystian Matusiewicz, Josef Pieprzy...
ICICS
2007
Springer
13 years 11 months ago
A Framework for Game-Based Security Proofs
Abstract. To be accepted, a cryptographic scheme must come with a proof that it satisfies some standard security properties. However, because cryptographic schemes are based on no...
David Nowak
ICIC
2007
Springer
13 years 11 months ago
An Improved Nested Partitions Algorithm Based on Simulated Annealing in Complex Decision Problem Optimization
: - This paper introduces the main ideas of the nested partitions (NP) method, analyses its efficiency theoretically and proposes the way to improve the optimization efficiency of ...
Yan Luo, Changrui Yu