Sciweavers

70 search results - page 5 / 14
» informaticalt 2008
Sort
View
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
14 years 9 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
INFORMATICALT
2007
109views more  INFORMATICALT 2007»
14 years 9 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
INFORMATICALT
2007
43views more  INFORMATICALT 2007»
14 years 9 months ago
Functional Test Generation Based on Combined Random and Deterministic Search Methods
Abstract. The aim of this paper is to explore some features of the functional test generation problem, and on the basis of the gained experience, to propose a practical method for ...
Eduardas Bareisa, Vacius Jusas, Kestutis Motiejuna...
INFORMATICALT
2007
75views more  INFORMATICALT 2007»
14 years 9 months ago
An Effective Method for Initialization of Lloyd-Max's Algorithm of Optimal Scalar Quantization for Laplacian Source
Abstract. In this paper an exact and complete analysis of the Lloyd–Max’s algorithm and its initialization is carried out. An effective method for initialization of Lloyd–Max...
Zoran Peric, Jelena Nikolic
INFORMATICALT
2007
119views more  INFORMATICALT 2007»
14 years 9 months ago
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce t...
Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huan...