Sciweavers

3638 search results - page 19 / 728
» Distribution chain security
Sort
View
ACISP
2001
Springer
13 years 11 months ago
Error Detection and Authentication in Quantum Key Distribution
Akihiro Yamamura, Hirokazu Ishizuka
CORR
2008
Springer
88views Education» more  CORR 2008»
13 years 7 months ago
Lower bounds for distributed markov chain problems
We study the worst-case communication complexity of distributed algorithms computing a path problem based on stationary distributions of random walks in a network G with the caveat...
Rahul Sami, Andy Twigg
MANSCI
2010
95views more  MANSCI 2010»
13 years 6 months ago
Using Scheduled Ordering to Improve the Performance of Distribution Supply Chains
We study a supply chain with one supplier and many retailers that face exogenous endcustomer demands. The supplier and the retailers all try to minimize their own inventory-relate...
Lucy Gongtao Chen, Srinagesh Gavirneni
ESORICS
2004
Springer
14 years 1 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
SPIN
2010
Springer
13 years 6 months ago
Time-Bounded Reachability in Distributed Input/Output Interactive Probabilistic Chains
Abstract. We develop an algorithm to compute timed reachability probabilities for distributed models which are both probabilistic and nondeterministic. To obtain realistic results ...
Georgel Calin, Pepijn Crouzen, Pedro R. D'Argenio,...