Sciweavers

1610 search results - page 75 / 322
» Identity Based Multisignatures
Sort
View
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 8 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...
131
Voted
IPPS
2007
IEEE
15 years 8 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
BMCBI
2007
120views more  BMCBI 2007»
15 years 1 months ago
Quantitative sequence-function relationships in proteins based on gene ontology
Background: The relationship between divergence of amino-acid sequence and divergence of function among homologous proteins is complex. The assumption that homologs share function...
Vineet Sangar, Daniel J. Blankenberg, Naomi Altman...
117
Voted
DLOG
1996
15 years 3 months ago
Towards a Legal Reasoning System based on Description Logics: A Position Paper
fe. Althoughthose legal concepts are abstract in the sense that there always exist possibilities to interpret them in various ways, lawyers seem to understand themas real things at...
Makoto Haraguchi
PR
2010
220views more  PR 2010»
15 years 10 days ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...