Sciweavers

648 search results - page 5 / 130
» Generalized Powering Functions and Their Application to Digi...
Sort
View
ASIACRYPT
2011
Springer
13 years 9 months ago
Short Signatures from Weaker Assumptions
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m ≥ 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into ...
Dennis Hofheinz, Tibor Jager, Eike Kiltz
HT
2003
ACM
15 years 2 months ago
The connectivity sonar: detecting site functionality by structural patterns
Web sites today serve many different functions, such as corporate sites, search engines, e-stores, and so forth. As sites are created for different purposes, their structure and...
Einat Amitay, David Carmel, Adam Darlow, Ronny Lem...
IJACT
2008
102views more  IJACT 2008»
14 years 9 months ago
An optimistic fair exchange protocol and its security in the universal composability framework
: Fair exchange protocols allow both or neither of two parties to obtain the other's items, and this property is essential in e-commerce. In this paper, we construct an optimi...
Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto
76
Voted
BMCBI
2008
108views more  BMCBI 2008»
14 years 9 months ago
Signature Evaluation Tool (SET): a Java-based tool to evaluate and visualize the sample discrimination abilities of gene express
Background: The identification of specific gene expression signature for distinguishing sample groups is a dominant field in cancer research. Although a number of tools have been ...
Chih-Hung Jen, Tsun-Po Yang, Chien-Yi Tung, Shu-Ha...
IJNSEC
2006
98views more  IJNSEC 2006»
14 years 9 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao