Sciweavers

12697 search results - page 87 / 2540
» Call for Papers
Sort
View
IJNSEC
2011
143views more  IJNSEC 2011»
14 years 6 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma
JCIT
2010
174views more  JCIT 2010»
14 years 6 months ago
Efficient Ming of Top-K Closed Sequences
Sequence mining is an important data mining task. In order to retrieve interesting sequences from a large database, a minimum support threshold is needed to be specified. Unfortun...
Panida Songram
HICSS
1998
IEEE
94views Biometrics» more  HICSS 1998»
15 years 4 months ago
An Internet-Based Platform for Testing Generation Scheduling Auctions
This paper describes the uses and architecture of a network-centered computing-rich software platform called PowerWeb. PowerWeb was designed and built as a simulation environment ...
Ray Zimmerman, Robert J. Thomas, Deqiang Gan, Carl...
TEI
2010
ACM
129views Hardware» more  TEI 2010»
15 years 6 months ago
TextDraw: a prototype for gestural typesetting
This paper considers a new approach that allows for the creation of typographic works through gestural interaction. It describes a prototype application called TextDraw, which is ...
Travis Kirton, Pamela Jennings, Hideaki Ogawa
AINA
2008
IEEE
15 years 6 months ago
A Concept of an Anonymous Direct P2P Distribution Overlay System
The paper introduces a peer-to-peer system called P2PRIV (peer-to-peer direct and anonymous distribution overlay). Basic novel features of P2PRIV are: (i) a peer-to-peer parallel ...
Igor Margasinski, Michal Pióro