Sciweavers

35 search results - page 3 / 7
» informaticalt 2007
Sort
View
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 4 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
INFORMATICALT
2007
111views more  INFORMATICALT 2007»
13 years 4 months ago
Sequent Calculi for Branching Time Temporal Logics of Knowledge and Belief
In this paper we consider branching time temporal logics of knowledge and belief. These logics involve the discrete time linear temporal logic operators “next” and “until” ...
Jurate Sakalauskaite
INFORMATICALT
2007
119views more  INFORMATICALT 2007»
13 years 4 months ago
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce t...
Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huan...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
13 years 4 months ago
Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images
This paper proposes a reversible data hiding method for error diffused halftone images. It employs statistics feature of pixel block patterns to embed data, and utilizes the HVS ch...
Jeng-Shyang Pan, Hao Luo, Zhe-Ming Lu
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
13 years 4 months ago
Strongly Absolute Stability Problem of Descriptor Systems
Abstract. This paper considers Lur’e type descriptor systems (LDS). The concept of strongly absolute stability is defined for LDS and such a notion is a generalization of absolu...
Chunyu Yang, Qingling Zhang, Linna Zhou