Sciweavers

74 search results - page 13 / 15
» Fully Leakage-Resilient Signatures
Sort
View
KBSE
1997
IEEE
15 years 4 months ago
NORA/HAMMR: Making Deduction-Based Software Component Retrieval Practical
Deduction-based software component retrieval uses preand postconditions as indexes and search keys and an automated theorem prover (ATP) to check whether a component matches. This...
Johann Schumann, Bernd Fischer 0002
IJISEC
2007
87views more  IJISEC 2007»
14 years 11 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
SOCO
2008
Springer
14 years 11 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
ICMCS
2010
IEEE
215views Multimedia» more  ICMCS 2010»
14 years 10 months ago
Saliency detection: A self-ordinal resemblance approach
In saliency detection, regions attracting visual attention need to be highlighted while effectively suppressing non-salient regions for the semantic scene understanding. However, ...
Wonjun Kim, Chanho Jung, Changick Kim
JCS
2010
121views more  JCS 2010»
14 years 10 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh