Sciweavers

761 search results - page 38 / 153
» Concise and Consistent Naming
Sort
View
CCS
2008
ACM
13 years 11 months ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor
ENGL
2006
70views more  ENGL 2006»
13 years 9 months ago
Strategies for Service Discovery over Ad Hoc Networks
Service discovery is an important and necessary component of ad hoc networks. To fit within the context of such networks, a post-query model with several service discovery strateg...
Michel Barbeau, Evangelos Kranakis, Honghui Luo
FSS
2006
87views more  FSS 2006»
13 years 9 months ago
Spline interpolation between hyperspaces of convex or fuzzy sets
We consider the interpolation problem for functions whose range and whose domain both consist of convex or fuzzy subsets of a real Euclidean space. This problem arises in fuzzy co...
Thomas Vetterlein
JSS
2006
65views more  JSS 2006»
13 years 9 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
FUIN
2007
116views more  FUIN 2007»
13 years 9 months ago
Path Compression in Timed Automata
The paper presents a method of abstraction for timed systems. To extract an abstract model of a timed system we propose to use static analysis, namely a technique called path compr...
Agata Janowska, Wojciech Penczek