Sciweavers

525 search results - page 81 / 105
» Threshold Schemes with Disenrollment
Sort
View
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 1 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
BMCBI
2004
96views more  BMCBI 2004»
14 years 11 months ago
Identification of regions in multiple sequence alignments thermodynamically suitable for targeting by consensus oligonucleotides
Background: Computer programs for the generation of multiple sequence alignments such as "Clustal W" allow detection of regions that are most conserved among many sequen...
Olga V. Matveeva, Brian T. Foley, Vladimir A. Nemt...
CTRSA
2009
Springer
112views Cryptology» more  CTRSA 2009»
15 years 3 months ago
Divisible On-Line/Off-Line Signatures
On-line/Off-line signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented. The idea is to split the signing pro...
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 3 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
CN
2002
106views more  CN 2002»
14 years 11 months ago
Quality of service and flow level admission control in the Internet
We propose to apply an integrated admission control scheme to both streaming flows and elastic flows. It is assumed that streaming flow packets are served with priority in network...
Nabil Benameur, Slim Ben Fredj, Sara Oueslati-Boul...