Sciweavers

2625 search results - page 177 / 525
» Applications 2000
Sort
View
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
15 years 8 months ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
CIKM
2000
Springer
15 years 8 months ago
Using Star Clusters for Filtering
We examine applications of clustering to the filtering task. We use the on-line version of the star algorithm [JPR98, JPR99] as the clustering tool because this algorithm compute...
Javed A. Aslam, Katya Pelekhov, Daniela Rus
140
Voted
CL
2000
Springer
15 years 8 months ago
Multi-dimensional Dynamic Logic Programming
This paper explores the applicability of the new paradigm of Multi-dimensional Dynamic Logic Programming to represent an agent’s view of the combination of societal knowledge dyn...
João Alexandre Leite, José Jú...
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Provably Secure Partially Blind Signatures
Partially blind signature schemes are an extension of blind signature schemes that allow a signer to explicitly include necessary information (expiration date, collateral condition...
Masayuki Abe, Tatsuaki Okamoto
113
Voted
DDEP
2000
Springer
15 years 8 months ago
A Link-Oriented Comparison of Hyperdocuments and Programs
There are parallels between the construction of programs and the construction of hypertexts, and in ar between the abstractions available to the application programmer and those a...
Heather Brown, Peter J. Brown, Les Carr, Wendy Hal...