Sciweavers

2654 search results - page 485 / 531
» On Pairing Inversion Problems
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
103
Voted
ICALP
2005
Springer
15 years 6 months ago
New Approaches for Virtual Private Network Design
Virtual Private Network Design is the following NP-hard problem. We are given a communication network, represented as a weighted graph with thresholds on the nodes which represent...
Friedrich Eisenbrand, Fabrizio Grandoni, Gianpaolo...
95
Voted
LOCA
2005
Springer
15 years 6 months ago
The GETA Sandals: A Footprint Location Tracking System
This paper presents the design, implementation, and evaluation of a footprintbased indoor location system on traditional Japanese GETA sandals. Our footprint location system can s...
Kenji Okuda, Shun-yuan Yeh, Chon-in Wu, Keng-hao C...
TLCA
2005
Springer
15 years 6 months ago
Recursive Functions with Higher Order Domains
In a series of articles, we developed a method to translate general recursive functions written in a functional programming style into constructive type theory. Three problems rema...
Ana Bove, Venanzio Capretta
WABI
2005
Springer
120views Bioinformatics» more  WABI 2005»
15 years 6 months ago
Multiple Structural RNA Alignment with Lagrangian Relaxation
In contrast to proteins, many classes of functionally related RNA molecules show a rather weak sequence conservation but instead a fairly well conserved secondary structure. Hence ...
Markus Bauer, Gunnar W. Klau, Knut Reinert