Sciweavers

57 search results - page 8 / 12
» On the Connection Between Signcryption and One-Pass Key Esta...
Sort
View
CCS
2009
ACM
14 years 8 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
BMCBI
2007
142views more  BMCBI 2007»
13 years 7 months ago
LinkHub: a Semantic Web system that facilitates cross-database queries and information retrieval in proteomics
nd: A key abstraction in representing proteomics knowledge is the notion of unique identifiers for individual entities (e.g. proteins) and the massive graph of relationships among...
Andrew K. Smith, Kei-Hoi Cheung, Kevin Y. Yip, Mar...
CRYPTO
2009
Springer
154views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem
We prove the equivalence, up to a small polynomial approximation factor n/ log n, of the lattice problems uSVP (unique Shortest Vector Problem), BDD (Bounded Distance Decoding) and...
Vadim Lyubashevsky, Daniele Micciancio
INFOCOM
2005
IEEE
14 years 1 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
TCS
2002
13 years 7 months ago
A unified language processing methodology
This paper discusses a mathematical concept of language that models both artificial and natural languages and thus provides a framework for a unified language processing methodolo...
Teodor Rus