Sciweavers

507 search results - page 73 / 102
» The XTR Public Key System
Sort
View
CCS
2001
ACM
15 years 2 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
ATAL
2005
Springer
15 years 3 months ago
Access control with safe role assignment for mobile agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. Sea-of-Data (SoD) applications are those that need to process huge quantities of distributed...
Guillermo Navarro, Joan Borrell, Jose A. Ortega-Ru...
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
15 years 3 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
TC
2008
14 years 9 months ago
Automatic Generation of Modular Multipliers for FPGA Applications
Since redundant number systems allow for constant time addition, they are often at the heart of modular multipliers designed for public key cryptography (PKC) applications. Indeed,...
Jean-Luc Beuchat, Jean-Michel Muller
BMCBI
2010
126views more  BMCBI 2010»
14 years 9 months ago
GeneBrowser 2: an application to explore and identify common biological traits in a set of genes
Background: The development of high-throughput laboratory techniques created a demand for computer-assisted result analysis tools. Many of these techniques return lists of genes w...
Joel Arrais, João Fernandes, João Pe...