Sciweavers

1610 search results - page 193 / 322
» Identity Based Multisignatures
Sort
View
97
Voted
ANOR
2005
124views more  ANOR 2005»
15 years 20 days ago
On Compact Formulations for Integer Programs Solved by Column Generation
Column generation has become a powerful tool in solving large scale integer programs. It is well known that most of the often reported compatibility issues between pricing subprobl...
Daniel Villeneuve, Jacques Desrosiers, Marco E. L&...
122
Voted
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
15 years 20 days ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
CCE
2004
15 years 19 days ago
On-line outlier detection and data cleaning
Outliers are observations that do not follow the statistical distribution of the bulk of the data, and consequently may lead to erroneous results with respect to statistical analy...
Hancong Liu, Sirish Shah, Wei Jiang
78
Voted
CDC
2010
IEEE
106views Control Systems» more  CDC 2010»
14 years 7 months ago
Constructive synchronization of networked feedback systems
This paper is concerned with global asymptotic output synchronization in networks of identical feedback systems. Using an operator theoretic approach based on an incremental small ...
Abdullah Omar Hamadeh, Guy-Bart Stan, Jorge M. Gon...
COMCOM
2011
14 years 7 months ago
Scalable RFID security protocols supporting tag ownership transfer
We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer. Many previously propos...
Boyeon Song, Chris J. Mitchell