Sciweavers

7623 search results - page 1221 / 1525
» Constructive Volume Modeling
Sort
View
ISW
2005
Springer
15 years 10 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
ASIACRYPT
2004
Springer
15 years 10 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
DNA
2004
Springer
132views Bioinformatics» more  DNA 2004»
15 years 10 months ago
Error Free Self-assembly Using Error Prone Tiles
DNA self-assembly is emerging as a key paradigm for nano-technology, nano-computation, and several related disciplines. In nature, DNA self-assembly is often equipped with explicit...
Ho-Lin Chen, Ashish Goel
NDSS
2003
IEEE
15 years 10 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
156
Voted
PPPJ
2003
ACM
15 years 10 months ago
An examination of the run-time performance of GUI creation frameworks
The graphical user interface (GUI) is an important component of many software systems. Past surveys indicate that the development of a GUI is a significant undertaking and that t...
Christopher J. Howell, Gregory M. Kapfhammer, Robe...
« Prev « First page 1221 / 1525 Last » Next »