Sciweavers

3629 search results - page 721 / 726
» A More Efficient Use of Delta-CRLs
Sort
View
IJSNET
2008
118views more  IJSNET 2008»
14 years 9 months ago
Public key cryptography empowered smart dust is affordable
: Public key cryptography (PKC) has been considered for a long time to be computationally too expensive for small battery powered devices. However, PKC turned out to be very benefi...
Steffen Peter, Peter Langendörfer, Krzysztof ...
IEICET
2006
108views more  IEICET 2006»
14 years 9 months ago
Plaintext Simulatability
We propose a new security class, called plaintext-simulatability, defined over the public-key encryption schemes. The notion of plaintext simulatability (denoted PS) is similar to ...
Eiichiro Fujisaki
IOR
2008
91views more  IOR 2008»
14 years 9 months ago
A Randomized Quasi-Monte Carlo Simulation Method for Markov Chains
We introduce and study a randomized quasi-Monte Carlo method for estimating the state distribution at each step of a Markov chain. The number of steps in the chain can be random an...
Pierre L'Ecuyer, Christian Lécot, Bruno Tuf...
JAIR
2008
104views more  JAIR 2008»
14 years 9 months ago
On the Qualitative Comparison of Decisions Having Positive and Negative Features
Making a decision is often a matter of listing and comparing positive and negative arguments. In such cases, the evaluation scale for decisions should be considered bipolar, that ...
Didier Dubois, Hélène Fargier, Jean-...
JSAC
2008
157views more  JSAC 2008»
14 years 9 months ago
Spectrum Leasing to Cooperating Secondary Ad Hoc Networks
Abstract--The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource ...
Osvaldo Simeone, Igor Stanojev, Stefano Savazzi, Y...