Sciweavers

1564 search results - page 222 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
ACISP
2007
Springer
15 years 4 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
BIOSURVEILLANCE
2007
Springer
15 years 4 months ago
Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...
BIOSURVEILLANCE
2007
Springer
15 years 4 months ago
A Study into Detection of Bio-Events in Multiple Streams of Surveillance Data
Abstract. This paper reviews the results of a study into combining evidence from multiple streams of surveillance data in order to improve timeliness and specificity of detection ...
Josep Roure, Artur Dubrawski, Jeff Schneider
CRYPTO
2007
Springer
105views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
In this paper we identify the (P, Q)-DDH assumption, as an extreme, powerful generalization of the Decisional Diffie-Hellman (DDH) assumption: virtually all previously proposed gen...
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazar&...
ISW
2007
Springer
15 years 4 months ago
Towards a DL-Based Additively Homomorphic Encryption Scheme
ElGamal scheme has been the first encryption scheme based on discrete logarithm. One of its main advantage is that it is simple, natural and efficient, but also that its security ...
Guilhem Castagnos, Benoît Chevallier-Mames