Sciweavers

1834 search results - page 270 / 367
» Public Key Cryptography
Sort
View
CSI
2007
91views more  CSI 2007»
13 years 7 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
EG
2007
126views more  EG 2007»
13 years 7 months ago
E-government: an e-reverse auction case study
This paper presents the findings from an exploratory in-depth case study with regard to eReverse Auctions (eRAs) in the UK public sector. These findings highlight that eRAs can im...
Steve Jones, Ray Hackney, Zahir Irani
NAR
2008
94views more  NAR 2008»
13 years 7 months ago
The Gene Ontology project in 2008
The Gene Ontology (GO) project (http://www.gene ontology.org/) provides a set of structured, controlled vocabularies for community use in annotating genes, gene products and seque...
FUIN
2007
99views more  FUIN 2007»
13 years 7 months ago
Verifying Security Protocols Modelled by Networks of Automata
In this paper we show a novel method for modelling behaviours of security protocols using networks of communicating automata in order to verify them with SAT-based bounded model ch...
Miroslaw Kurkowski, Wojciech Penczek
SIAMJO
2008
93views more  SIAMJO 2008»
13 years 7 months ago
Sufficient Second-Order Optimality Conditions for Semilinear Control Problems with Pointwise State Constraints
Second-order sufficient optimality conditions are established for the optimal control of semilinear elliptic and parabolic equations with pointwise constraints on the control and t...
Eduardo Casas, Juan Carlos de los Reyes, Fredi Tr&...