Sciweavers

178 search results - page 13 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
JALC
2006
87views more  JALC 2006»
14 years 11 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
ASIACRYPT
2001
Springer
15 years 3 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
ICIP
2001
IEEE
16 years 1 months ago
Extraction of rotation invariant signature based on fractal geometry
In this paper, a new method of feature extraction with rotation invariant property is presented. One of the main contributions of this study is that a rotation invariant signature...
Yu Tao, Thomas R. Ioerger, Yuan Yan Tang
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 1 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
BMCBI
2007
97views more  BMCBI 2007»
14 years 12 months ago
In situ analysis of cross-hybridisation on microarrays and the inference of expression correlation
Background: Microarray co-expression signatures are an important tool for studying gene function and relations between genes. In addition to genuine biological co-expression, corr...
Tineke Casneuf, Yves Van de Peer, Wolfgang Huber