Sciweavers

1282 search results - page 121 / 257
» Signing on signing off
Sort
View
EJC
2007
13 years 9 months ago
The homology of the cycle matroid of a coned graph
The cone ˆG of a finite graph G is obtained by adding a new vertex p, called the cone point, and joining each vertex of G to p by a simple edge. We show that the rank of the red...
Woong Kook
JOT
2006
75views more  JOT 2006»
13 years 9 months ago
Encrypting the Java Serialized Object
The cryptographic classes incorporated into Sun's releases of the Java Virtual Machine are often used in e-commerce and other applications. A mechanism exists for signing a J...
Alan Ward
MJ
2008
117views more  MJ 2008»
13 years 9 months ago
Efficient implementation of 3X for radix-8 encoding
Several commercial processors have selected the radix-8 multiplier architecture to increase their speed, thereby reducing the number of partial products. Radix-8 encoding reduces ...
Gustavo A. Ruiz, Mercedes Granda
JSYML
2006
79views more  JSYML 2006»
13 years 9 months ago
Local-global properties of positive primitive formulas in the theory of spaces of orderings
f spaces of signs (abstract real spectra) developed in [1] [18]. We consider pp (positive primitive) formulas in the language of reduced special groups as in [20]. We denote the pp...
M. Marshall
IJNSEC
2007
83views more  IJNSEC 2007»
13 years 9 months ago
Secure Logging for Irrefutable Administration
This paper presents a method that allows for securely saving a temporal sequence of data (log lines) in a file. Log lines are signed by an authority, and are thus unalterable wit...
Paolo Dal Checco, Francesco Bergadano, Davide Cava...