Sciweavers

20175 search results - page 92 / 4035
» Is abstraction the key to computing
Sort
View
81
Voted
CORR
2008
Springer
109views Education» more  CORR 2008»
15 years 22 days ago
Compactly accessible categories and quantum key distribution
Abstract. Compact categories have lately seen renewed interest via applications to quantum physics. Being essentially finite-dimensional, they cannot accomodate (co)limit-based con...
Chris Heunen
90
Voted
JUCS
2008
143views more  JUCS 2008»
15 years 18 days ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
GLOBECOM
2009
IEEE
15 years 7 months ago
SNR Estimation for a Non-Coherent Binary Frequency Shift Keying Receiver
Abstract—This paper deals with the problem of estimating average signal-to-noise ratio (SNR) for a communication system employing non-coherent binary frequency shift keying (NCBF...
Syed Ali Hassan, Mary Ann Ingram
CANS
2009
Springer
194views Cryptology» more  CANS 2009»
15 years 7 months ago
Algebraic Attack on the MQQ Public Key Cryptosystem
Abstract. In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups (MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by so...
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes ...
ICDT
2007
ACM
133views Database» more  ICDT 2007»
15 years 6 months ago
XML Schema Mappings in the Presence of Key Constraints and Value Dependencies
Abstract. Schema mappings play a central role in both data integration and data exchange, and are understood as high-level specifications describing the relationships between data...
Tadeusz Pankowski, Jolanta Cybulka, Adam Meissner