Sciweavers

790 search results - page 79 / 158
» Designated Confirmer Signatures
Sort
View
FLAIRS
2006
13 years 11 months ago
On Repairing Reasoning Reversals via Representational Refinements
Representation is a fluent. A mismatch between the real world and an agent's representation of it can be signalled by unexpected failures (or successes) of the agent's r...
Alan Bundy, Fiona McNeill, Christopher Walton
ICISC
2000
102views Cryptology» more  ICISC 2000»
13 years 11 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
WCE
2007
13 years 11 months ago
Analysis of User Specific Interleavers for Iterative Multi-User Detection System
—Interleave division multiple access (IDMA) and orthogonal frequency division multiplexing – interleave division multiple access (OFDM-IDMA) have been proposed for beyond third...
Omer Nawaz, Waqas Nasir, Zia Bhadiar, Imtiaz Ahmed...
BIRTHDAY
2010
Springer
13 years 10 months ago
Change Management for Heterogeneous Development Graphs
Abstract. The error-prone process of formal specification and verification of large systems requires an efficient, evolutionary formal development approach. Development graphs have...
Serge Autexier, Dieter Hutter, Till Mossakowski
IJISEC
2008
92views more  IJISEC 2008»
13 years 10 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk