The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Affinity Propagation (AP) clustering does not need to set the number of clusters, and has advantages on efficiency and accuracy, but is not suitable for large-scale data clustering. To ensure both a low time complexity and a good accuracy for the clustering method of affinity propagation on large-scale data clustering, an improved AP clustering algorithm named hierarchical affinity propagation (HAP)...
Binary translation is the emulation of one instruction set by another through translation of code. Sequences of instructions are translated from the source to the target instruction set. The semantic equivalence conversion of instructions is the core of a binary translation system. In order to simulate the behavior of a program on the target platform more accurately, the change of the special state...
Multi-source binary translation system (MBT) provides a multi-source platform code to a single target platform migration solution. Do not know the source code, you can achieve the multi-source platform, multi-compiled version of the executable file on another platform. In order to achieve the special semantic mapping function of the MBT system, the need for a unified, compatible with multiple target...
Key agreement is one of the fundamental cryptographic primitives in public key cryptography. It plays an important role for securing systems in practice. In this paper, we present the first certificateless one-way authenticated two-party key agreement protocol. The security of the proposed protocol is analyzed based on the intractability of the standard discrete logarithm (DL) and bilinear Diffie-Hellman...
In this paper, we propose a practical ID-based (partially)blind signature scheme. Our scheme combines the already existing notions of blind signatures and identity-based cryptography.The signatures are shown secure in the random oracle model. We show how to use our ID-based PBSs to construct an electronic cash (e-cash) system in which multiple banks can securely distribute untraceable e-cash.
In existing software registration schemes, the privacy of users is not taken into account and may be in the risks of abuses. In this paper, we proposed a novel software registration system which can greatly reduce unauthorized use of software while keeping the privacy of users. To the best of our knowledge, this is the first system that the privacy of users is guaranteed in software registration....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.