Sciweavers

3638 search results - page 35 / 728
» Distribution chain security
Sort
View
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
ENTCS
2008
83views more  ENTCS 2008»
13 years 7 months ago
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous sett...
Tom Goovaerts, Bart De Win, Wouter Joosen
HICSS
2002
IEEE
135views Biometrics» more  HICSS 2002»
14 years 20 days ago
Integrated Production Planning and Route Scheduling in Pulp Mill Industry
In this paper we consider the complete supply chain for a large pulp producer in Sweden. The supply chain is divided up in two parts, the pulp production planning problem and the ...
David Bredström, Mikael Rönnqvist
IJAR
2007
100views more  IJAR 2007»
13 years 7 months ago
Multisensor triplet Markov chains and theory of evidence
Hidden Markov chains (HMC) are widely applied in various problems occurring in different areas like Biosciences, Climatology, Communications, Ecology, Econometrics and Finances, ...
Wojciech Pieczynski
MSWIM
2009
ACM
14 years 2 months ago
How do wireless chains behave?: the impact of MAC interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...