Sciweavers

5752 search results - page 373 / 1151
» Informative Labeling Schemes
Sort
View
CCS
2007
ACM
15 years 11 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
SAC
2006
ACM
15 years 10 months ago
Adaptive mutation with fitness and allele distribution correlation for genetic algorithms
In this paper, a new gene based adaptive mutation scheme is proposed for genetic algorithms (GAs), where the information on gene based fitness statistics and on gene based allele...
Shengxiang Yang, Sima Uyar
WAIM
2009
Springer
15 years 9 months ago
IRank: A Term-Based Innovation Ranking System for Conferences and Scholars
Since the proposition of Journal Impact Factor [1] in 1963, the classical citation-based ranking scheme has been a standard criterion to rank journals and conferences. However, the...
Zhixu Li, Xiaoyong Du, Hongyan Liu, Jun He, Xiaofa...
141
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 8 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko