Sciweavers

893 search results - page 62 / 179
» Descent Theory for Schemes
Sort
View
IPSN
2004
Springer
15 years 5 months ago
Naps: scalable, robust topology management in wireless ad hoc networks
Topology management schemes conserve energy in wireless ad hoc networks by identifying redundant nodes that may turn off their radios or other components while maintaining connec...
Brighten Godfrey, David Ratajczak
ET
2010
89views more  ET 2010»
14 years 10 months ago
On the Duality of Probing and Fault Attacks
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited at...
Berndt M. Gammel, Stefan Mangard
COCO
2003
Springer
118views Algorithms» more  COCO 2003»
15 years 5 months ago
Lower bounds for predecessor searching in the cell probe model
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form “What i...
Pranab Sen
CSFW
2010
IEEE
15 years 3 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
ECIS
2000
15 years 1 months ago
Pricing Digital Information Goods and Services on the Net
Many analysts argue that the Internet is producing a fundamental change in the way that business works. The network economy grows faster every day. Internet markets are developing ...
Laurent L. Pauwels, Paul B. McLeod