Sciweavers

1168 search results - page 109 / 234
» cases 2000
Sort
View
CRYPTO
2000
Springer
184views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signature’s originator ca...
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene ...
122
Voted
DGCI
2000
Springer
15 years 9 months ago
Reconstruction of Discrete Sets with Absorption
A generalization of a classical discrete tomography problem is considered: Reconstruct binary matrices from their absorbed row and columns sums, i.e., when some known absorption is...
Attila Kuba, Maurice Nivat
DIAU
2000
Springer
15 years 9 months ago
Protection Profiles for Remailer Mixes
In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main rea...
Giovanni Iachello, Kai Rannenberg
124
Voted
ECWEB
2000
Springer
125views ECommerce» more  ECWEB 2000»
15 years 9 months ago
Advanced Studies on Link Proposals and Knowledge Retrieval of Hypertexts with CBR
In this paper, several problems in associating hyperlinks to text and the diverse possibilities to overcome these problems are discussed. At the current stage, an important aspect ...
Ernst Georg Haffner, Andreas Heuer 0002, Uwe Roth,...
EDBT
2000
ACM
15 years 8 months ago
Management and Query Processing of One-Dimensional Intervals with the UB-Tree
The management and query processing of one dimensional intervals is a special case of extended object handling. One dimensional intervals play an important role in temporal databa...
Robert Fenk