Sciweavers

679 search results - page 88 / 136
» Using decision problems in public key cryptography
Sort
View
JUCS
2010
127views more  JUCS 2010»
14 years 11 months ago
A Selection Process Based on Additive Consistency to Deal with Incomplete Fuzzy Linguistic Information
: In group decision making situations, there may be cases in which experts do not have an in-depth knowledge of the problem to be solved and, as a result, they may present incomple...
Francisco Javier Cabrerizo, Ruben Heradio, Ignacio...
STOC
2004
ACM
177views Algorithms» more  STOC 2004»
16 years 1 months ago
Lower bounds for linear degeneracy testing
Abstract. In the late nineties, Erickson proved a remarkable lower bound on the decision tree complexity of one of the central problems of computational geometry: given n numbers, ...
Nir Ailon, Bernard Chazelle
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 2 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
ICCSA
2009
Springer
15 years 8 months ago
Designing Data Warehouses for Geographic OLAP Querying by Using MDA
Data aggregation in Geographic Information Systems (GIS) is a desirable feature, spatial data are integrated in OLAP engines for this purpose. However, the development and operatio...
Octavio Glorio, Juan Trujillo
INFOCOM
2008
IEEE
15 years 7 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge