Sciweavers

3190 search results - page 13 / 638
» cans 2011
Sort
View
IJNSEC
2011
128views more  IJNSEC 2011»
14 years 4 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao
IJSSE
2011
127views more  IJSSE 2011»
14 years 4 months ago
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints
The Extensible Markup Language is susceptible to security breaches because it does not incorporate methods to protect the information it encodes. Our work presented in this paper f...
Sean Policarpio, Yan Zhang
INFORMATICALT
2011
91views more  INFORMATICALT 2011»
14 years 4 months ago
A Quadratic Loss Multi-Class SVM for which a Radius-Margin Bound Applies
To set the values of the hyperparameters of a support vector machine (SVM), the method of choice is cross-validation. Several upper bounds on the leave-one-out error of the pattern...
Yann Guermeur, Emmanuel Monfrini
JCT
2011
77views more  JCT 2011»
14 years 4 months ago
Hypercube orientations with only two in-degrees
We consider the problem of orienting the edges of the n-dimensional hypercube so only two different in-degrees a and b occur. We show that this can be done, for two specified in...
Joe Buhler, Steve Butler, Ronald L. Graham, Eric T...
JOC
2011
81views more  JOC 2011»
14 years 4 months ago
An L(1/3) Discrete Logarithm Algorithm for Low Degree Curves
We present an algorithm for solving the discrete logarithm problem in Jacobians of families of plane curves whose degrees in X and Y are low with respect to their genera. The fin...
Andreas Enge, Pierrick Gaudry, Emmanuel Thom&eacut...