Sciweavers

700 search results - page 51 / 140
» words 2005
Sort
View
FC
2005
Springer
109views Cryptology» more  FC 2005»
15 years 3 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
COLT
2005
Springer
15 years 3 months ago
Towards a Theoretical Foundation for Laplacian-Based Manifold Methods
In recent years manifold methods have attracted a considerable amount of attention in machine learning. However most algorithms in that class may be termed “manifold-motivatedâ€...
Mikhail Belkin, Partha Niyogi
FSE
2005
Springer
98views Cryptology» more  FSE 2005»
15 years 3 months ago
New Attacks Against Reduced-Round Versions of IDEA
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced-round versions of IDEA (with 2, 2.5, 3, 3.5, and 4 ro...
Pascal Junod
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
15 years 3 months ago
Optimization of the MOVA Undeniable Signature Scheme
This article presents optimization results on the recent MOVA undeniable signature scheme presented by Monnerat and Vaudenay at PKC ’04 as well as its generalization proposed at ...
Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
CG
2005
Springer
14 years 9 months ago
Fast rendering of dynamic clouds
We propose an efficient framework for dynamic cloud rendering. Base on the proposed simplified lighting model, the Shadow Relation Table (SRT) and Metaball Lighting Texture Databa...
Horng-Shyang Liao, Tan-Chi Ho, Jung-Hong Chuang, C...