Sciweavers

2715 search results - page 218 / 543
» Database Publication Practices
Sort
View
EUROCRYPT
2000
Springer
13 years 12 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 8 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
MP
1998
76views more  MP 1998»
13 years 8 months ago
Warm start of the primal-dual method applied in the cutting-plane scheme
A practical warm-start procedure is described for the infeasible primal-dualinterior-point method employed to solve the restricted master problem within the cutting-plane method. ...
Jacek Gondzio
PSYCHNOLOGY
2007
107views more  PSYCHNOLOGY 2007»
13 years 7 months ago
Discourses on Mobility and Technological Mediation: The Texture of Ubiquitous Interaction
Mobility is more and more mediated, supported and transformed by technological artefacts and infrastructures. Especially technologies labelled as mobile, pervasive, ubiquitous or ...
Giuseppina Pellegrino
WEBI
2010
Springer
13 years 6 months ago
Domain-Specific Backlinking Services in the Web of Data
Abstract--This paper describes an Open Linked Data backlinking service, a generic architecture component to support the discovery of useful links between items across highly connec...
Manuel Salvadores, Gianluca Correndo, Martin Szoms...