نتایج جستجو برای: ident
تعداد نتایج: 404 فیلتر نتایج به سال:
An ad-hoc anonymous identification scheme is a new multiuser cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove membership anonymously in such groups. Recently, Nguyen [11] proposed an ID-based ad-hoc anonymous identification scheme from bilinear pairings. However, in this paper, we propose an attack on Nguyen’s ID-based ad-hoc anonymou...
Statistical zero-knowledge (SZK) properties play an important role in designing cryptographic protocols that enforce honest behavior while maintaining privacy. This paper presents a novel approach for verifying SZK properties, using recently developed techniques based on approximate simulation relations. We formulate statistical indistinguishability as an implementation relation in the Task-PIO...
James Allen defined a calculus of time intervals by ident i fying time intervals as pairs of real numbers, and considering binary relations that can hold between such pairs [Alll83]. We call this the Interval Calculus. We consider the system of interval time units defined in [Lad86.2] (the T U S ) , which was intended for the natural representation of real clock time on any scale. We introduce ...
POPS ts a processor for a simple nondeterminist ic programming language, PSL. POPS accepts a problem stated in PSL and attempts to solve it by f inding a successfu l execut ion of the PSL program, POPS operates by ident i fy ing elements of the input program wi th elements of the heur is t ic search paradigm, analyzing the input program to obta in informat ion about the problem operat o r s , a...
The API ZYM system was compared with four anaerobe identification systems for the definitive identification of Clostridium difficile by using 88 cultures of C. difficile grown on Mueller-Hinton blood agar medium. The API ZYM system yielded a distinct and consistent enzyme profile for all test strains, whereas the sensitivities of the other systems in identifying C. difficile ranged from 78 to 9...
Morphologically distinct yeast colonies from partially and fully processed fruits and vegetables were isolated over a 3-year period. Identification of 239 strains was achieved by using standard methods, commercial identification kits (API 20C and API YEAST-IDENT), and a simplified system for food-borne yeasts. The identified strains of fruit origin represented 36 species belonging to 19 genera....
This paper describes the Software Technology Risk Advisor (STRA), a knowledge-based software engineering tool that provides assistance in identifiing and managing sojbare technology risks. The STRA contains a knowledgebase of software product and process needs, satisfiing capabilities, and capability maturity factors. Afrer a user ranks the importance of relevant nee& to his or her project, the...
Ident~fy~ng the origins of s~mp~e chiefdoms ~n the archaeological record is a subject that has elicited significant debate among archaeologists working in the Chumash region . We address several s~gn~ficant issues raised by Arnold and Greerι eoncern~ng our interpretations of the mortuary data from the site of Malίbu . We argue, contrary to their assertion of ambiguity, that when multiple fines ...
Let P = f" + (I ,,) , the direct sum of the p x p identity matrix and the negative of the q x q ident ity matrix. The fo llowing theorem is proved. TH EOHEM: If X = cZ where Z is a 4 x 4 P-orthogonal , P-skew-symmetric matrix and Ie I .;;; 2, there exist matrices A an.d B, both of which are P-orthogollal and P-skew-symmetric, sach that X = AB BA. Methods for o btaining certain matrices which sa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید