Sciweavers

1610 search results - page 164 / 322
» Identity Based Multisignatures
Sort
View
IPCO
2004
107views Optimization» more  IPCO 2004»
15 years 4 months ago
A Robust Optimization Approach to Supply Chain Management
Abstract. We propose a general methodology based on robust optimization to address the problem of optimally controlling a supply chain subject to stochastic demand in discrete time...
Dimitris Bertsimas, Aurélie Thiele
KDID
2004
134views Database» more  KDID 2004»
15 years 4 months ago
Theoretical Bounds on the Size of Condensed Representations
Abstract. Recent studies demonstrate the usefulness of condensed representations as a semantic compression technique for the frequent itemsets. Especially in inductive databases, c...
Nele Dexters, Toon Calders
AAECC
2006
Springer
77views Algorithms» more  AAECC 2006»
15 years 3 months ago
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
A new framework for protection against key exposure was recently suggested by Dodis et. al. [16]. We take its realization further towards practice by presenting simple new schemes...
Mihir Bellare, Adriana Palacio
CSDA
2006
95views more  CSDA 2006»
15 years 3 months ago
Identifying influential multinomial observations by perturbation
The assessment of the influence of individual observations on the outcome of the analysis by perturbation has received a lot of attention for situations in which the observations ...
S. O. Nyangoma, W.-K. Fung, R. C. Jansen
ISCI
2008
160views more  ISCI 2008»
15 years 3 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan