Sciweavers

3428 search results - page 175 / 686
» Making the Case
Sort
View
ACISP
2005
Springer
15 years 9 months ago
Tunable Balancing of RSA
We propose a key generation method for RSA moduli which allows the cost of the public operations (encryption/verifying) and the private operations (decryption/signing) to be balanc...
Steven D. Galbraith, Chris Heneghan, James F. McKe...
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
15 years 8 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
ATAL
2008
Springer
15 years 6 months ago
Trajectories of goods in distributed allocation
Distributed allocation mechanisms rely on the agents' autonomous (and supposedly rational) behaviour: states evolve as a result of agents contracting deals and exchanging res...
Yann Chevaleyre, Ulle Endriss, Nicolas Maudet
KI
2007
Springer
15 years 10 months ago
A General Framework for Encoding and Evolving Neural Networks
Abstract. In this paper we present a novel general framework for encoding and evolving networks called Common Genetic Encoding (CGE) that can be applied to both direct and indirect...
Yohannes Kassahun, Jan Hendrik Metzen, Jose de Gea...
SIGIR
2006
ACM
15 years 10 months ago
Tensor space model for document analysis
Vector Space Model (VSM) has been at the core of information retrieval for the past decades. VSM considers the documents as vectors in high dimensional space. In such a vector spa...
Deng Cai, Xiaofei He, Jiawei Han