Sciweavers

1307 search results - page 78 / 262
» Follow the intellectual property
Sort
View
SAFECOMP
2005
Springer
15 years 7 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
ICLP
1997
Springer
15 years 5 months ago
Total Homeostaticity and Integrity Constraints Restorability Recognition
We introduce and explore a property of deductive data bases with updates wich we call total homeostaticity, and which substantially generalizes the following their property: ”fo...
Michael I. Dekhtyar, Alexander Ja. Dikovsky
98
Voted
CCCG
1996
15 years 2 months ago
Generalizing Halfspaces
Restricted-orientation convexity is the study of geometric objects whose intersection with lines from some fixed set is empty or connected. We have studied the properties of restri...
Eugene Fink, Derick Wood
SAGT
2010
Springer
191views Game Theory» more  SAGT 2010»
14 years 12 months ago
Complexity of Safe Strategic Voting
We investigate the computational aspects of safe manipulation, a new model of coalitional manipulation that was recently put forward by Slinko and White [11]. In this model, a pot...
Noam Hazon, Edith Elkind
CORR
2007
Springer
127views Education» more  CORR 2007»
15 years 1 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata