Sciweavers

1005 search results - page 23 / 201
» Practical Secure Function Evaluation
Sort
View
SASN
2005
ACM
14 years 1 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
DEEC
2007
IEEE
14 years 1 months ago
BestChoice SRM: a simple and practical supplier relationship management system for e-procurement
Supplier relationship management (SRM) is an important contributor to a company’s efficiency and credibility. Although several ways are used to provide SRM functionality, these a...
Dongjoo Lee, Seungseok Kang, Sangkeun Lee, Young-g...
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
ICCSA
2007
Springer
14 years 1 months ago
Solving a Practical Examination Timetabling Problem: A Case Study
This paper presents a Greedy-Least Saturation Degree (G-LSD) heuristic (which is an adaptation of the least saturation degree heuristic) to solve a real-world examination timetabli...
Masri Ayob, Ariff Md. Ab. Malik, Salwani Abdullah,...
MOC
2010
13 years 2 months ago
On the numerical evaluation of Fredholm determinants
Some significant quantities in mathematics and physics are most naturally expressed as the Fredholm determinant of an integral operator, most notably many of the distribution funct...
Folkmar Bornemann