Sciweavers

2601 search results - page 317 / 521
» Secure Rewarding Schemes
Sort
View
IWSEC
2010
Springer
15 years 2 months ago
Publishing Upper Half of RSA Decryption Exponent
In the perspective of RSA, given small encryption exponent e (e.g., e = 216 + 1), the top half of the decryption exponent d can be narrowed down within a small search space. This f...
Subhamoy Maitra, Santanu Sarkar, Sourav Sengupta
IJNSEC
2010
127views more  IJNSEC 2010»
14 years 11 months ago
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
Harn et al. proposed a series of Diffie-Hellman key exchange protocols which are integrated into Digital Signature Algorithm in 2004. Recently, Phan pointed out that Harn et al.&#...
Jie Liu, Jianhua Li
MOC
2010
14 years 11 months ago
hp-Optimal discontinuous Galerkin methods for linear elliptic problems
Abstract. The aim of this paper is to present and analyze a class of hpversion discontinuous Galerkin (DG) discretizations for the numerical approximation of linear elliptic proble...
Benjamin Stamm, Thomas P. Wihler
MOC
2010
14 years 11 months ago
Approximation of nonlinear wave equations with nonstandard anisotropic growth conditions
Weak solutions for nonlinear wave equations involving the p(x)-Laplacian, for p : (1, ) are constructed as appropriate limits of solutions of an implicit finite element discretiz...
Jonas Haehnle, Andreas Prohl
GIL
2011
14 years 3 months ago
Business Process Support using RFID-based Information Services in the Distribution of Fresh Fruits and Vegetables
: The efficient distribution of fresh produce poses many challenges to enterprises in the fruit and vegetable sector. The exchange of product- and processrelated information betwee...
Robert Reiche, Richard J. Lehmann, Melanie Fritz, ...