Sciweavers

4529 search results - page 90 / 906
» Position Based Cryptography
Sort
View
223
Voted
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 8 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
EUROCRYPT
1999
Springer
15 years 9 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
SPW
2004
Springer
15 years 10 months ago
Pseudonymity in the Light of Evidence-Based Trust
This position paper discusses the relation of privacy, namely pseudonymity, to evidence-based trust (or rather reputation). Critical concepts of evidence-based trust/reputation sys...
Daniel Cvrcek, Václav Matyás Jr.
RSFDGRC
2005
Springer
133views Data Mining» more  RSFDGRC 2005»
15 years 10 months ago
Rough Set Approximation Based on Dynamic Granulation
In this paper, the concept of a granulation order is proposed in an information system. The positive approximation of a set under a granulation order is defined. Some properties o...
Jiye Liang, Yuhua Qian, Chengyuan Chu, Deyu Li, Ju...
135
Voted
ARITH
2003
IEEE
15 years 10 months ago
On-Line Multiplication in Real and Complex Base
Multiplication of two numbers represented in base   is shown to be computable by an on-line algorithm when   is a negative integer, a positive non-integer real number, or a comp...
Christiane Frougny, Athasit Surarerks