Sciweavers

35 search results - page 2 / 7
» informaticalt 2007
Sort
View
INFORMATICALT
2007
81views more  INFORMATICALT 2007»
13 years 4 months ago
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem
A generalized group-oriented cryptosystem (GGOC) based on ElGamal cryptosystem was proposed by Yang et al. in 2003. This study shows that if the authorized decryption sets of users...
Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
INFORMATICALT
2010
103views more  INFORMATICALT 2010»
13 years 1 months ago
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme
In 2007, Kancharla et al. proposed an identity-based strong designated verifier signature (IBSDVS) scheme based on bilinear pairings, and claimed it unforgeable and non-delegatable...
Xun Sun, Jianhua Li, Hu Yin, Gongliang Chen
INFORMATICALT
2007
101views more  INFORMATICALT 2007»
13 years 4 months ago
Internationalization of Compilers
Internationalization of compilers and localization of programming languages is not a usual phenomenon yet; however, due to a rapid progress of software and programming technologies...
Valentina Dagiene, Rimgaudas Laucius
INFORMATICALT
2007
75views more  INFORMATICALT 2007»
13 years 4 months ago
An Effective Method for Initialization of Lloyd-Max's Algorithm of Optimal Scalar Quantization for Laplacian Source
Abstract. In this paper an exact and complete analysis of the Lloyd–Max’s algorithm and its initialization is carried out. An effective method for initialization of Lloyd–Max...
Zoran Peric, Jelena Nikolic
INFORMATICALT
2007
92views more  INFORMATICALT 2007»
13 years 4 months ago
An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images
Abstract. The paper considers application of stochastic optimization to system of automatic recognition of ischemic stroke area on computed tomography (CT) images. The algorithm of...
Darius Grigaitis, Vaida Bartkute, Leonidas Sakalau...