Sciweavers

679 search results - page 93 / 136
» Using decision problems in public key cryptography
Sort
View
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 8 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
CODASPY
2012
13 years 9 months ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
CL
2000
Springer
15 years 5 months ago
The Taming of the (X)OR
Abstract. Many key verification problems such as boundedmodel-checking,circuit verification and logical cryptanalysis are formalized with combined clausal and affine logic (i.e....
Peter Baumgartner, Fabio Massacci
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 1 months ago
Name-ethnicity classification from open sources
The problem of ethnicity identification from names has a variety of important applications, including biomedical research, demographic studies, and marketing. Here we report on th...
Anurag Ambekar, Charles B. Ward, Jahangir Mohammed...
GIS
1998
ACM
15 years 5 months ago
Greedy Cuts: An Advancing Front Terrain Triangulation Algorithm
We apply an advancing front technique to the problem of simplification of dense digitized terrain models. While most simplification algorithms have been based on either incrementa...
Cláudio T. Silva, Joseph S. B. Mitchell