Sciweavers

22193 search results - page 46 / 4439
» Multiple Restricted Multiplication
Sort
View
JSS
2010
150views more  JSS 2010»
14 years 9 months ago
Towards a general purpose architecture for UI generation
Many software projects spend a significant proportion of their time developing the User Interface (UI), therefore any degree of automation in this area has clear benefits. Such au...
Richard Kennard, John Leaney
JAIR
2011
214views more  JAIR 2011»
14 years 2 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
CHES
2006
Springer
82views Cryptology» more  CHES 2006»
15 years 2 months ago
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
We describe algorithms for point multiplication on Koblitz curves using multiple-base expansions of the form k =
V. S. Dimitrov, Kimmo U. Järvinen, M. J. Jaco...
SIGECOM
2004
ACM
96views ECommerce» more  SIGECOM 2004»
15 years 4 months ago
Expressive negotiation over donations to charities
When donating money to a (say, charitable) cause, it is possible to use the contemplated donation as negotiating material to induce other parties interested in the charity to dona...
Vincent Conitzer, Tuomas Sandholm
EUROCRYPT
2000
Springer
15 years 2 months ago
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) f...
Ronald Cramer, Ivan Damgård, Ueli M. Maurer