Sciweavers

625 search results - page 46 / 125
» Generalized Ring Signatures
Sort
View
TABLEAUX
2005
Springer
15 years 5 months ago
A Calculus for Type Predicates and Type Coercion
We extend classical first-order logic with subtyping by type predicates and type coercion. Type predicates assert that the value of a term belongs to a more special type than the ...
Martin Giese
ECOOP
2006
Springer
15 years 3 months ago
Parameterized Modules for Classes and Extensible Functions
Abstract. We present F(Eml), a language that combines classes, extensible functions, symmetric multiple dispatching, and a practical system for parameterized modules. Parameterized...
Keunwoo Lee, Craig Chambers
IJNSEC
2006
80views more  IJNSEC 2006»
14 years 12 months ago
A Forward-Secure User Authentication Scheme with Smart Cards
In 2004, Yoon et al. proposed a user authentication scheme based on generalized ElGamal signature scheme using smart cards. In their scheme, the previous session keys will be comp...
Bin Wang, Zheng-Quan Li
ISSTA
2009
ACM
15 years 6 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
BMCBI
2010
121views more  BMCBI 2010»
15 years 10 hour ago
MS4 - Multi-Scale Selector of Sequence Signatures: An alignment-free method for classification of biological sequences
Background: While multiple alignment is the first step of usual classification schemes for biological sequences, alignment-free methods are being increasingly used as alternatives...
Eduardo Corel, Florian Pitschi, Ivan Laprevotte, G...