Sciweavers

234 search results - page 42 / 47
» Proof Nets and the Identity of Proofs
Sort
View
FSS
2006
85views more  FSS 2006»
14 years 10 months ago
The logic of tied implications, part 2: Syntax
An implication operator A is said to be tied if there is a binary operation T that ties A; that is, the identity A(a, A(b, z)) = A(T (a, b), z) holds for all a, b, z. We aim at th...
Nehad N. Morsi, Wafik Boulos Lotfallah, Moataz Sal...
IJISEC
2006
113views more  IJISEC 2006»
14 years 10 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...
MCSS
2008
Springer
14 years 10 months ago
Lax-Phillips scattering theory and well-posed linear systems: a coordinate-free approach
Abstract. We give a further elaboration of the fundamental connections between Lax-Phillips scattering, conservative input/state/output linear systems and Sz.-Nagy-Foias model theo...
Joseph A. Ball, Philip T. Carroll, Yoichi Uetake
TIT
2002
78views more  TIT 2002»
14 years 9 months ago
Communicating via a processing broadcast satellite
Three dependent users are physically separated but communicate with each other via a satellite. Each user generates data which it stores locally. In addition, each user sends a me...
Aaron D. Wyner, Jack K. Wolf, Frans M. J. Willems
INFOCOM
2010
IEEE
14 years 8 months ago
CapAuth: A Capability-based Handover Scheme
—Existing handover schemes in wireless LANs, 3G/4G networks, and femtocells rely upon protocols involving centralized authentication servers and one or more access points. These ...
Liang Cai, Sridhar Machiraju, Hao Chen