Sciweavers

436 search results - page 48 / 88
» A Note on Negligible Functions
Sort
View
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
15 years 2 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
EUROCRYPT
2000
Springer
15 years 1 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
TREC
2008
14 years 11 months ago
York University at TREC 2008: Blog Track
York University participated in the TREC 2008 Blog track, by introducing two opinion finding features. By initially focusing solely on the sentiment terms found in a document, usi...
Mladen Kovacevic, Xiangji Huang
SIP
2007
14 years 11 months ago
A variational segmentation framework using active contours and thresholding
Segmentation involves separating distinct regions in an image. In this note, we present a novel variational approach to perform this task. We propose an energy functional that nat...
Samuel Dambreville, Marc Niethammer, Anthony J. Ye...
ACL
2004
14 years 11 months ago
Using Linguistic Principles to Recover Empty Categories
This paper describes an algorithm for detecting empty nodes in the Penn Treebank (Marcus et al., 1993), finding their antecedents, and assigning them function tags, without access...
Richard Campbell