Sciweavers

178 search results - page 16 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
SASN
2003
ACM
15 years 5 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
IJMMS
2007
91views more  IJMMS 2007»
14 years 11 months ago
Mining communities and their relationships in blogs: A study of online hate groups
Blogs, often treated as the equivalence of online personal diaries, have become one of the fastest growing types of Web-based media. Everyone is free to express their opinions and...
Michael Chau, Jennifer Jie Xu
BMCBI
2008
135views more  BMCBI 2008»
14 years 12 months ago
Identification of a small optimal subset of CpG sites as bio-markers from high-throughput DNA methylation profiles
Background: DNA methylation patterns have been shown to significantly correlate with different tissue types and disease states. High-throughput methylation arrays enable large-sca...
Hailong Meng, Edward Lenn Murrelle, Guoya Li
CSDA
2006
233views more  CSDA 2006»
14 years 12 months ago
Analysis of Type-II progressively hybrid censored data
The mixture of Type-I and Type-II censoring schemes, called the hybrid censoring scheme is quite common in life-testing or reliability experiments. Recently Type-II progressive ce...
Debasis Kundu, Avijit Joarder
EUROCRYPT
1999
Springer
15 years 4 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart