Sciweavers

91 search results - page 6 / 19
» Weak Composite Diffie-Hellman
Sort
View
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 7 months ago
On the Security of Huang-Chang Multi-signature Schemes
Recently, based on RSA and discrete logarithm with composite modulus, Huang and Chang proposed two multisignature schemes with distinguished signing authority and claimed that the...
Jianhong Zhang, Wei Zou
IIWAS
2008
13 years 9 months ago
Model-driven engineering of composite web services using UML-S
Based on top of Web protocols and XML language, Web services are emerging as a framework to provide applicationto-application interaction. An important challenge is their integrat...
Christophe Dumez, Jaafar Gaber, Maxime Wack
DATE
2008
IEEE
103views Hardware» more  DATE 2008»
14 years 2 months ago
Compositional design of isochronous systems
The synchronous modeling paradigm provides strong execution correctness guarantees to embedded system design while making minimal environmental assumptions. In most related framew...
Jean-Pierre Talpin, Julien Ouy, Loïc Besnard,...
GECCO
2005
Springer
175views Optimization» more  GECCO 2005»
14 years 1 months ago
An approach for QoS-aware service composition based on genetic algorithms
Web services are rapidly changing the landscape of software engineering. One of the most interesting challenges introduced by web services is represented by Quality Of Service (Qo...
Gerardo Canfora, Massimiliano Di Penta, Raffaele E...
ICC
2009
IEEE
180views Communications» more  ICC 2009»
14 years 2 months ago
Composite Hypothesis Testing for Cooperative Spectrum Sensing in Cognitive Radio
—In this paper, we present a composite hypothesis testing approach for cooperative spectrum sensing. We derive the optimal likelihood ratio test (LRT) statistic based on the Neym...
Sepideh Zarrin, Teng Joon Lim