Sciweavers

790 search results - page 79 / 158
» Designated Confirmer Signatures
Sort
View
133
Voted
FLAIRS
2006
15 years 5 months ago
On Repairing Reasoning Reversals via Representational Refinements
Representation is a fluent. A mismatch between the real world and an agent's representation of it can be signalled by unexpected failures (or successes) of the agent's r...
Alan Bundy, Fiona McNeill, Christopher Walton
139
Voted
ICISC
2000
102views Cryptology» more  ICISC 2000»
15 years 4 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
152
Voted
WCE
2007
15 years 4 months ago
Analysis of User Specific Interleavers for Iterative Multi-User Detection System
—Interleave division multiple access (IDMA) and orthogonal frequency division multiplexing – interleave division multiple access (OFDM-IDMA) have been proposed for beyond third...
Omer Nawaz, Waqas Nasir, Zia Bhadiar, Imtiaz Ahmed...
101
Voted
BIRTHDAY
2010
Springer
15 years 3 months ago
Change Management for Heterogeneous Development Graphs
Abstract. The error-prone process of formal specification and verification of large systems requires an efficient, evolutionary formal development approach. Development graphs have...
Serge Autexier, Dieter Hutter, Till Mossakowski
141
Voted
IJISEC
2008
92views more  IJISEC 2008»
15 years 3 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk