Sciweavers

1018 search results - page 74 / 204
» Generative unbinding of names
Sort
View
AMW
2010
13 years 10 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 10 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
COR
2006
99views more  COR 2006»
13 years 9 months ago
Artificial neural networks and multicriterion analysis for sustainable irrigation planning
The objective of the present paper is to select the best compromise irrigation planning strategy for the case study of Jayakwadi irrigation project, Maharashtra, India. Four-phase...
K. Srinivasa Raju, D. Nagesh Kumar, Lucien Duckste...
CORR
2006
Springer
132views Education» more  CORR 2006»
13 years 9 months ago
Navigating multilingual news collections using automatically extracted information
We are presenting a text analysis tool set that allows analysts in various fields to sieve through large collections of multilingual news items quickly and to find information that...
Ralf Steinberger, Bruno Pouliquen, Camelia Ignat
CN
2007
115views more  CN 2007»
13 years 9 months ago
SPAD: A distributed middleware architecture for QoS enhanced alternate path discovery
In the next generation Internet, the network will evolve from a plain communication medium into one that provides endless services to the users. These services will be composed of...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...