Sciweavers

1401 search results - page 135 / 281
» Randomness in Interactive Proofs
Sort
View
ISCI
2008
160views more  ISCI 2008»
14 years 10 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
INFORMATICALT
2006
105views more  INFORMATICALT 2006»
14 years 10 months ago
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
Yu Long, Kefei Chen, Shengli Liu
JCC
2006
57views more  JCC 2006»
14 years 10 months ago
A search algorithm for fixed-composition protein design
: We present a computational protein design algorithm for finding low-energy sequences of fixed amino acid composition. The search algorithms used in protein design typically do no...
Geoffrey K. Hom, Stephen L. Mayo
CORR
2002
Springer
95views Education» more  CORR 2002»
14 years 9 months ago
Qualitative Visualization of Distance Information
Different types of two- and three-dimensional representations of a finite metric space are studied that focus on the accurate representation of the linear order among the distance...
Jobst Heitzig
TCAD
2002
128views more  TCAD 2002»
14 years 9 months ago
Preferred direction Steiner trees
Interconnect optimization for VLSI circuits has received wide attention. To model routing surfaces, multiple circuit layers are freabstracted as a single rectilinear plane, ignori...
Mehmet Can Yildiz, Patrick H. Madden