Sciweavers

495 search results - page 58 / 99
» Signed quorum systems
Sort
View
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
CCS
1993
ACM
15 years 4 months ago
Why Cryptosystems Fail
Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionall...
Ross J. Anderson
ACSAC
2001
IEEE
15 years 3 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
CIMCA
2006
IEEE
15 years 6 months ago
Direct Adaptive Fuzzy Control with Less Restrictions on the Control Gain
: In the adaptive fuzzy control field for affine nonlinear systems, there are two basic configurations: direct and indirect. It is well known that the direct configuration needs mo...
Phi Anh Phan, Timothy J. Gale
CISST
2003
181views Hardware» more  CISST 2003»
15 years 1 months ago
Quadrilateral Signboard Detection and Text Extraction
There are numerous rectangular signboards indoors and outdoors. The information contained in them, such as signs and text, is useful for robot navigation. In this paper, a system ...
Angela Tam, Hua Shen, Jianzhuang Liu, Xiaoou Tang