Identification scheme

Known as: Identification 
In metadata, an identification scheme is used to identify unique records in a set. If a data element is used to identify a record within a data set… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Recently, the development of speed estimation methods for sensorless control of induction motor drives has found great interest… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 8
Is this relevant?
Highly Cited
2008
Highly Cited
2008
There is an inherent difficulty in building 3-move ID schemes based on combinatorial problems without much algebraic structure. A… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper, we show that two variants of Stern’s identification scheme [IEEE Transaction on Information Theory ’96] are… (More)
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
  • Michel Fliess, Hebertt Sira Ramírez
  • 2003
A closed loop parametrical identification procedure for continuous-time constant linear systems is introduced. This approach… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A lumped parameter model of open-frame unmanned underwater vehicles (UUV's) including the effects of propeller-hull and propeller… (More)
  • figure 1
  • figure 2
  • table I
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The concept of group signatures allows a group member to sign messages anonymously on behalf of the group. However, in the case… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Zero-knowledge proofs were introduced in 1985, in a paper by Goldwasser, Micali and Rackoff ([6]). Their practical significance… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
This paper presents a three-move interactive identification scheme and proves it to be as secure as t h e discrete logarithm… (More)
Is this relevant?
Highly Cited
1991
Highly Cited
1991
A model reference adaptive control system is described for a speed sensorless control of the vector controlled inverter-fed… (More)
Is this relevant?