Sciweavers

679 search results - page 65 / 136
» Using decision problems in public key cryptography
Sort
View
APBC
2003
123views Bioinformatics» more  APBC 2003»
15 years 2 months ago
A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data
In this paper we suggest the requirements for an open platform designed for the description, distribution and analysis of genetic polymorphism data. This platform is discussed in ...
Greg D. Tyrelle, Garry C. King
ENTCS
2007
129views more  ENTCS 2007»
15 years 1 months ago
Protocol Composition Logic (PCL)
Protocol Composition Logic (PCL) is a logic for proving security properties of network protocols that use public and symmetric key cryptography. The logic is designed around a pro...
Anupam Datta, Ante Derek, John C. Mitchell, Arnab ...
CCS
2008
ACM
15 years 3 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
SAC
2005
ACM
15 years 7 months ago
Learning decision trees from dynamic data streams
: This paper presents a system for induction of forest of functional trees from data streams able to detect concept drift. The Ultra Fast Forest of Trees (UFFT) is an incremental a...
João Gama, Pedro Medas, Pedro Pereira Rodri...
COMPGEOM
1996
ACM
15 years 5 months ago
New Lower Bounds for Convex Hull Problems in Odd Dimensions
We show that in the worst case, (ndd=2e;1 +n logn) sidedness queries are required to determine whether the convex hull of n points in IRd is simplicial, or to determine the number ...
Jeff Erickson