Sciweavers

1610 search results - page 192 / 322
» Identity Based Multisignatures
Sort
View
86
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 26 days ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
92
Voted
CORR
2008
Springer
116views Education» more  CORR 2008»
15 years 26 days ago
Optimal Scheduling of File Transfers with Divisible Sizes on Multiple Disjoint Paths
In this paper I investigate several offline and online data transfer scheduling problems and propose efficient algorithms and techniques for addressing them. In the offline case, ...
Mugurel Ionut Andreica
95
Voted
CORR
2006
Springer
91views Education» more  CORR 2006»
15 years 24 days ago
Universal Codes as a Basis for Time Series Testing
We suggest a new approach to hypothesis testing for ergodic and stationary processes. In contrast to standard methods, the suggested approach gives a possibility to make tests, ba...
Boris Ryabko, Jaakko Astola
98
Voted
FUIN
2007
85views more  FUIN 2007»
15 years 22 days ago
Entropies and Co-Entropies of Coverings with Application to Incomplete Information Systems
Different generalizations to the case of coverings of the standard approach to entropy applied to partitions of a finite universe X are explored. In the first approach any cover...
Daniela Bianucci, Gianpiero Cattaneo, Davide Ciucc...
IJNSEC
2007
130views more  IJNSEC 2007»
15 years 21 days ago
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme
In 2004, Libert and Quisquater proposed an identity based undeniable signature scheme using pairings over elliptic curves. In this article, we show that the scheme is not secure. ...
Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-M...