Sciweavers

369 search results - page 61 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
EUROPKI
2004
Springer
15 years 1 months ago
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments
Abstract. A substantial number of micropayment schemes in the literature are based on distributing the cost of a digital signature over several successive micropayments (e.g. Paywo...
Josep Domingo-Ferrer
INFOCOM
2007
IEEE
15 years 3 months ago
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
—The demand for efficient data dissemination/access techniques to find the relevant data from within a sensor network has led to the development of data-centric sensor networks...
Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao
BMCBI
2006
138views more  BMCBI 2006»
14 years 9 months ago
Determination of strongly overlapping signaling activity from microarray data
Background: As numerous diseases involve errors in signal transduction, modern therapeutics often target proteins involved in cellular signaling. Interpretation of the activity of...
Ghislain Bidaut, Karsten Suhre, Jean-Michel Claver...
95
Voted
ISI
2004
Springer
15 years 2 months ago
Analyzing and Visualizing Criminal Network Dynamics: A Case Study
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...
SDM
2009
SIAM
185views Data Mining» more  SDM 2009»
15 years 6 months ago
Understanding Importance of Collaborations in Co-authorship Networks: A Supportiveness Analysis Approach.
Co-authorship networks, an important type of social networks, have been studied extensively from various angles such as degree distribution analysis, social community extraction a...
Bin Zhou 0002, Jian Pei, Yan Jia, Yi Han