Sciweavers

631 search results - page 2 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
SIAMMA
2010
134views more  SIAMMA 2010»
13 years 3 days ago
Convergence in Strongly Monotone Systems with an Increasing First Integral
In this paper we generalize a useful result due to Mierczy
Murad Banaji, David Angeli
SODA
2012
ACM
217views Algorithms» more  SODA 2012»
11 years 7 months ago
Polynomial integrality gaps for strong SDP relaxations of Densest k-subgraph
The Densest k-subgraph problem (i.e. find a size k subgraph with maximum number of edges), is one of the notorious problems in approximation algorithms. There is a significant g...
Aditya Bhaskara, Moses Charikar, Aravindan Vijayar...
LOGCOM
2010
152views more  LOGCOM 2010»
13 years 4 days ago
Constructive Logic with Strong Negation as a Substructural Logic
Gentzen systems are introduced for Spinks and Veroff's substructural logic corresponding to constructive logic with strong negation, and some logics in its vicinity. It has b...
Manuela Busaniche, Roberto Cignoli
ACSAC
2005
IEEE
13 years 11 months ago
Improved Port Knocking with Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
EUC
2007
Springer
13 years 11 months ago
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronizati...
JaeCheol Ha, Sang-Jae Moon, Juan Manuel Gonz&aacut...