Semantic Scholar uses AI to extract papers important to this topic.
This paper overviews the recent work on compressive sensing, a new approach to data acquisition in which analog signals are… Expand This paper details a content analysis scheme to measure the quality of political deliberation in face-to-face and online groups… Expand In this paper, we show that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid… Expand Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in… Expand For the past few years almost every manufacturing industry has been trying to get 'lean'. A headlong rush to become lean also… Expand DrScheme is a programming environment for Scheme. It fully integrates a graphics-enriched editor, a parser for multiple variants… Expand We propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal's (1985) public key… Expand Summary In topology optimization of structures, materials and mechanisms, parametrization of geometry is often performed by a… Expand At EUROCRYPT'88, we introduced an interactive zero-knowledge protocol (Guillou and Quisquater ) fitted to the authentication… Expand From the Publisher:
With an analytical and rigorous approach to problem solving and programming techniques,this book is oriented… Expand