Sciweavers

1610 search results - page 193 / 322
» Identity Based Multisignatures
Sort
View
ANOR
2005
124views more  ANOR 2005»
15 years 3 months ago
On Compact Formulations for Integer Programs Solved by Column Generation
Column generation has become a powerful tool in solving large scale integer programs. It is well known that most of the often reported compatibility issues between pricing subprobl...
Daniel Villeneuve, Jacques Desrosiers, Marco E. L&...
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
15 years 3 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
CCE
2004
15 years 3 months ago
On-line outlier detection and data cleaning
Outliers are observations that do not follow the statistical distribution of the bulk of the data, and consequently may lead to erroneous results with respect to statistical analy...
Hancong Liu, Sirish Shah, Wei Jiang
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
14 years 10 months ago
Constructive synchronization of networked feedback systems
This paper is concerned with global asymptotic output synchronization in networks of identical feedback systems. Using an operator theoretic approach based on an incremental small ...
Abdullah Omar Hamadeh, Guy-Bart Stan, Jorge M. Gon...
COMCOM
2011
14 years 10 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell