Sciweavers

20175 search results - page 15 / 4035
» Is abstraction the key to computing
Sort
View
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
IACR
2011
207views more  IACR 2011»
14 years 2 days ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
105
Voted
GI
2009
Springer
14 years 10 months ago
Component Governance as a Key Factor for IT Business Alignment of Telecommunications Companies
Abstract: Modern telecommunications companies currently undergo remarkable structural changes to be successful in the Next-Generation markets for communications and content product...
Sebastian Reinisch, Uwe Beyer, Robert Mertens
125
Voted
CORR
2008
Springer
154views Education» more  CORR 2008»
15 years 16 days ago
A Counterexample Guided Abstraction-Refinement Framework for Markov Decision Processes
rexample Guided Abstraction-Refinement Framework for Markov Decision Processes ROHIT CHADHA and MAHESH VISWANATHAN Dept. of Computer Science, University of Illinois at Urbana-Champ...
Rohit Chadha, Mahesh Viswanathan
109
Voted
JACM
2007
160views more  JACM 2007»
15 years 10 days ago
Lossless abstraction of imperfect information games
abstraction of imperfect information games ANDREW GILPIN and TUOMAS SANDHOLM Computer Science Department Carnegie Mellon University Pittsburgh, PA, USA Finding an equilibrium of an...
Andrew Gilpin, Tuomas Sandholm