An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and Shacham) is a method for combining n signatures from n different signers on n different messages int...
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Ho...
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Abstract. We present a straightforward way to use temporal decorrelation as preprocessing in linear and post-nonlinear independent component analysis (ICA) with higher order statis...
This paper presents a technique for the adaptive refinement of tetrahedral meshes. What makes it unique is that no neighbor information is required for the refined mesh to be co...
Traditional library catalog systems have been effective in providing access to collections of books, films, and other material. However, they have many limitations when it comes ...