Sciweavers

1497 search results - page 250 / 300
» A Computational Model for Message Passing
Sort
View
ISW
2000
Springer
13 years 11 months ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
SIROCCO
2010
13 years 9 months ago
Event Extent Estimation
This paper studies local-control strategies to estimate the size of a certain event affecting an arbitrary connected subset of nodes in a network. For example, our algorithms allow...
Marcin Bienkowski, Leszek Gasieniec, Marek Klonows...
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
13 years 9 months ago
Fast asynchronous byzantine agreement and leader election with full information
We resolve two long-standing open problems in distributed computation by describing polylogarithmic protocols for Byzantine agreement and leader election in the asynchronous full ...
Bruce M. Kapron, David Kempe, Valerie King, Jared ...
NIPS
1996
13 years 9 months ago
Effective Training of a Neural Network Character Classifier for Word Recognition
We have combined an artificial neural network (ANN) character classifier with context-driven search over character segmentation, word segmentation, and word recognition hypotheses...
Larry S. Yaeger, Richard F. Lyon, Brandyn J. Webb
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 8 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li