Sciweavers

429 search results - page 40 / 86
» Permutative Additives and Exponentials
Sort
View
ATAL
2004
Springer
14 years 1 months ago
On Safe Kernel Stable Coalition Forming among Agents
We investigate and discuss safety and privacy preserving properties of a game-theortic based coalition algorithm KCA for forming kernel stable coalitions among information agents ...
Bastian Blankenburg, Matthias Klusch
WOLLIC
2010
Springer
14 years 23 days ago
Reduction of the Intruder Deduction Problem into Equational Elementary Deduction for Electronic Purse Protocols with Blind Signa
Abstract. The intruder deduction problem for an electronic purse protocol with blind signatures is considered. The algebraic properties of the protocol are modeled by an equational...
Daniele Nantes Sobrinho, Mauricio Ayala-Rinc&oacut...
DFT
2002
IEEE
103views VLSI» more  DFT 2002»
14 years 20 days ago
Input Ordering in Concurrent Checkers to Reduce Power Consumption
A novel approach for reducing power consumption in checkers used for concurrent error detection is presented. Spatial correlations between the outputs of the circuit that drives t...
Kartik Mohanram, Nur A. Touba
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
14 years 6 days ago
Forward-Secure Signatures with Optimal Signing and Verifying
We propose the first forward-secure signature scheme for which both signing and verifying are as efficient as for one of the most efficient ordinary signature schemes (Guillou-Qui...
Gene Itkis, Leonid Reyzin
VLSID
2000
IEEE
75views VLSI» more  VLSID 2000»
14 years 2 days ago
Timing Analysis with Implicitly Specified False Paths
We consider the problem of timing analysis in the presence of known false paths. The main difficulty in adaptation of classical breadth-first search to the problem is that at each...
Eugene Goldberg, Alexander Saldanha