Sciweavers

1282 search results - page 121 / 257
» Signing on signing off
Sort
View
81
Voted
EJC
2007
15 years 22 days ago
The homology of the cycle matroid of a coned graph
The cone ˆG of a finite graph G is obtained by adding a new vertex p, called the cone point, and joining each vertex of G to p by a simple edge. We show that the rank of the red...
Woong Kook
JOT
2006
75views more  JOT 2006»
15 years 22 days ago
Encrypting the Java Serialized Object
The cryptographic classes incorporated into Sun's releases of the Java Virtual Machine are often used in e-commerce and other applications. A mechanism exists for signing a J...
Alan Ward
64
Voted
MJ
2008
117views more  MJ 2008»
15 years 22 days ago
Efficient implementation of 3X for radix-8 encoding
Several commercial processors have selected the radix-8 multiplier architecture to increase their speed, thereby reducing the number of partial products. Radix-8 encoding reduces ...
Gustavo A. Ruiz, Mercedes Granda
86
Voted
JSYML
2006
79views more  JSYML 2006»
15 years 22 days ago
Local-global properties of positive primitive formulas in the theory of spaces of orderings
f spaces of signs (abstract real spectra) developed in [1] [18]. We consider pp (positive primitive) formulas in the language of reduced special groups as in [20]. We denote the pp...
M. Marshall
89
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
15 years 21 days ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...