Sciweavers

1282 search results - page 103 / 257
» Signing on signing off
Sort
View
AMC
2005
124views more  AMC 2005»
15 years 22 days ago
The security of a strong proxy signature scheme with proxy signer privacy protection
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In 2001, Lee et al. const...
Narn-Yih Lee, Ming-Feng Lee
88
Voted
CG
2002
Springer
15 years 20 days ago
Visualising chaos in a model of brain electrical activity
It is a major source of contention in brain dynamics as to whether the electrical rhythms of the brain show signs of chaos. Here we discuss evidence for the existence of chaos in ...
Mathew P. Dafilis, Paul D. Bourke, David T. J. Lil...
TC
1998
15 years 14 days ago
Comments on Duprat and Muller's Branching CORDIC Paper
In [1], Duprat and Muller introduced the ingenious “Branching CORDIC” algorithm. It enables a fast implementation of CORDIC algorithm using signed digits and requires a consta...
Dhananjay S. Phatak
SIGOPS
2002
88views more  SIGOPS 2002»
15 years 14 days ago
A pragmatic alternative to undetachable signatures
A `pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were introduced by Sander and Tschudin, [4], as a means of giving a mobile agent the...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
111
Voted
TIFS
2010
186views more  TIFS 2010»
14 years 11 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang