Sciweavers

14824 search results - page 2415 / 2965
» Security - Introduction
Sort
View
148
Voted
AGENTS
2000
Springer
15 years 9 months ago
Adaptivity in agent-based routing for data networks
Adaptivity, both of the individual agents and of the interaction structure among the agents, seems indispensable for scaling up multi-agent systems MAS's in noisy environme...
David Wolpert, Sergey Kirshner, Christopher J. Mer...
151
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
140
Voted
ICPR
2010
IEEE
15 years 9 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
170
Voted
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
139
Voted
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
« Prev « First page 2415 / 2965 Last » Next »