Sciweavers

24 search results - page 1 / 5
» Asymmetric Currency Rounding
Sort
View
FC
2000
Springer
102views Cryptology» more  FC 2000»
13 years 8 months ago
Asymmetric Currency Rounding
David M'Raïhi, David Naccache, Michael Tunsta...
ICNS
2007
IEEE
13 years 11 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
ASIACRYPT
2004
Springer
13 years 10 months ago
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding
Duong Hieu Phan, David Pointcheval
STOC
1995
ACM
114views Algorithms» more  STOC 1995»
13 years 8 months ago
On data structures and asymmetric communication complexity
c communication case. This lemma generalizes and abstracts in a very clean form the ``round reduction'' techniques used in many previous lower bound proofs. ] 1998 Academ...
Peter Bro Miltersen, Noam Nisan, Shmuel Safra, Avi...
APPROX
2008
Springer
100views Algorithms» more  APPROX 2008»
13 years 6 months ago
A Simple LP Relaxation for the Asymmetric Traveling Salesman Problem
A long-standing conjecture in Combinatorial Optimization is that the integrality gap of the Held-Karp LP relaxation for the Asymmetric Traveling Salesman Problem (ATSP) is a consta...
Thành Nguyen