Sciweavers

154 search results - page 6 / 31
» ets 2011
Sort
View
IACR
2011
182views more  IACR 2011»
13 years 9 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
IACR
2011
80views more  IACR 2011»
13 years 9 months ago
History-Free Sequential Aggregate Signatures
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion o...
Marc Fischlin, Anja Lehmann, Dominique Schröd...
ACL
2011
14 years 1 months ago
Domain Adaptation for Machine Translation by Mining Unseen Words
We show that unseen words account for a large part of the translation error when moving to new domains. Using an extension of a recent approach to mining translations from compara...
Hal Daumé III, Jagadeesh Jagarlamudi
COGSCI
2011
43views more  COGSCI 2011»
14 years 4 months ago
Japanese Sound-Symbolism Facilitates Word Learning in English-Speaking Children
Sound symbolism is the non-arbitrary link between the sound of a word and its meaning. Imai et al. (2008) showed that Japanese speaking children benefited from the presence of sou...
Katerina Kantartzis, Mutsumi Imai, Sotaro Kita
IJNSEC
2011
143views more  IJNSEC 2011»
14 years 4 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma