Sciweavers

1610 search results - page 53 / 322
» Identity Based Multisignatures
Sort
View
EUROCAST
2009
Springer
153views Hardware» more  EUROCAST 2009»
14 years 11 months ago
Algorithm for Testing the Leibniz Algebra Structure
Abstract. Given a basis of a vector space V over a field K and a multiplication table which defines a bilinear map on V , we develop a computer program on Mathematica which checks ...
José Manuel Casas, Manuel A. Insua, Manuel ...
99
Voted
IJBC
2010
123views more  IJBC 2010»
14 years 11 months ago
Synchronization of Chaotic fractional-Order Systems via Linear Control
The chaotic dynamics of fractional-order systems has attracted much attention recently. Chaotic synchronization of fractional-order systems is further studied in this paper. We inv...
Zaid M. Odibat, Nathalie Corson, M. A. Aziz-Alaoui...
104
Voted
ISITA
2010
14 years 11 months ago
Syndrome former trellis construction for punctured convolutional codes
In this paper syndrome former trellis construction for punctured convolutional codes (PCCs) is discussed. The class of (np - 1)/np-rate PCCs derived from 1/n-rate mother codes is c...
Jan Geldmacher, Jürgen Götze
IH
1998
Springer
15 years 6 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes
CCS
2004
ACM
15 years 7 months ago
Concealing complex policies with hidden credentials
Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing ...
Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons