Sciweavers

507 search results - page 52 / 102
» The XTR Public Key System
Sort
View
95
Voted
OR
2006
Springer
15 years 23 days ago
An AHP model for construction contractor prequalification
Given that contractor plays a critical role in any construction project, contractor selection constitutes key decision for public authorities. Prequalification, i.e. the eliminati...
K. P. Anagnostopoulos, A. P. Vavatsikos
104
Voted
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
Simulatable VRFs with Applications to Multi-theorem NIZK
Abstract. This paper introduces simulatable verifiable random functions (sVRF). VRFs are similar to pseudorandom functions, except that they are also verifiable: corresponding to...
Melissa Chase, Anna Lysyanskaya
142
Voted
MT
2007
158views more  MT 2007»
15 years 10 days ago
Automatic extraction of translations from web-based bilingual materials
This paper describes the framework of the StatCan Daily Translation Extraction System (SDTES), a computer system that maps and compares webbased translation texts of Statistics Can...
Qibo Zhu, Diana Zaiu Inkpen, Ash Asudeh
ICIP
2005
IEEE
16 years 2 months ago
An asymmetric watermarking method for copyright protection utilizing dual bases
We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of a...
Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
15 years 6 months ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory