Sciweavers

679 search results - page 90 / 136
» Using decision problems in public key cryptography
Sort
View
SIAMCO
2011
14 years 8 months ago
Consistency of Sequential Bayesian Sampling Policies
We consider Bayesian information collection, in which a measurement policy collects information to support a future decision. This framework includes ranking and selection, continu...
Peter Frazier, Warren B. Powell
AINA
2009
IEEE
15 years 6 months ago
Preference Ordering in Agenda Based Multi-issue Negotiation for Service Level Agreement
—This paper discusses multi-issue negotiation between agents such as providers and consumers in a group decision making environment. The outcome of such encounters depends on two...
Fahmida Abedin, Kuo-Ming Chao, Nick Godwin, Hisbel...
GEOINFO
2004
15 years 2 months ago
Urban Planning by Simulation of Population Growth
: Urban planning is a very important issue to guarantee the sustainable development of modern towns. Many aspects must be considered and one of the most important is the population...
Cirano Iochpe, Flávio Rech Wagner, Andr&eac...
ADHOCNOW
2010
Springer
15 years 2 months ago
Data Aggregation Integrity Based on Homomorphic Primitives in Sensor Networks
Designing message integrity schemes for data aggregation is an imperative problem for securing wireless sensor networks. In this paper, we propose three secure aggregation schemes ...
Zhijun Li, Guang Gong
PKC
2011
Springer
197views Cryptology» more  PKC 2011»
14 years 4 months ago
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
We investigate the security of a generalization of HFE (multivariate and odd-characteristic variants). First, we propose an improved version of the basic Kipnis-Shamir key recovery...
Luk Bettale, Jean-Charles Faugère, Ludovic ...