Sciweavers

679 search results - page 50 / 136
» Using decision problems in public key cryptography
Sort
View
EMO
2009
Springer
235views Optimization» more  EMO 2009»
15 years 8 months ago
Bi-objective Optimization for the Vehicle Routing Problem with Time Windows: Using Route Similarity to Enhance Performance
Abstract. The Vehicle Routing Problem with Time Windows is a complex combinatorial optimization problem which can be seen as a fusion of two well known sub-problems: the Travelling...
Abel Garcia-Najera, John A. Bullinaria
PKC
2007
Springer
219views Cryptology» more  PKC 2007»
15 years 7 months ago
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
Daewan Han, Myung-Hwan Kim, Yongjin Yeom
WINE
2005
Springer
161views Economy» more  WINE 2005»
15 years 6 months ago
Design of Incentive Compatible Mechanisms for Stackelberg Problems
This paper takes the first steps towards designing incentive compatible mechanisms for hierarchical decision making problems involving selfish agents. We call these Stackelberg p...
Dinesh Garg, Yadati Narahari
DCOSS
2006
Springer
15 years 5 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
102
Voted
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 10 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa