Sciweavers

204 search results - page 24 / 41
» el 2006
Sort
View
79
Voted
ITNG
2006
IEEE
15 years 5 months ago
On the Security of a Repaired Mental Poker Protocol
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be flawed in 2004: any player (or any outsider knowing the deck coding) is able to...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
ANTS
2006
Springer
125views Algorithms» more  ANTS 2006»
15 years 3 months ago
Arithmetic of Generalized Jacobians
This paper aims at introducing generalized Jacobians as a new candidate for discrete logarithm (DL) based cryptography. The motivation for this work came from the observation that ...
Isabelle Déchène
AUSAI
2006
Springer
15 years 3 months ago
Polynomial Pipelined Neural Network and Its Application to Financial Time Series Prediction
A novel type of higher order pipelined neural network, the polynomial pipelined neural network, is presented. The network is constructed from a number of higher order neural networ...
Abir Jaafar Hussain, Adam Knowles, Paulo J. G. Lis...
87
Voted
DSOM
2006
Springer
15 years 3 months ago
Conflict Prevention Via Model-Driven Policy Refinement
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. Central to the approach is an algori...
Steven Davy, Brendan Jennings, John Strassner
ESORICS
2006
Springer
15 years 3 months ago
A Linear Logic of Authorization and Knowledge
We propose a logic for specifying security policies at a very el of abstraction. The logic accommodates the subjective nature of affirmations for authorization and knowledge withou...
Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pf...