Sciweavers

1898 search results - page 128 / 380
» Weak Keys for IDEA
Sort
View
INFORMATICALT
2000
93views more  INFORMATICALT 2000»
13 years 8 months ago
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
In the (t, n) proxy signature scheme, the signature, originally signed by a signer, can be signed by t or more proxy signers out of a proxy group of n members. Recently, an efficie...
Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
JUCS
2000
76views more  JUCS 2000»
13 years 8 months ago
Mixed Relations as Enriched Semiringal Categories
Abstract: A study of the classes of nite relations as enriched strict monoidal categories is presented in CaS91]. The relations there are interpreted as connections in owchart sche...
Radu Grosu, Dorel Lucanu, Gheorghe Stefanescu
SIAMAM
2000
95views more  SIAMAM 2000»
13 years 8 months ago
Hopf Bifurcation Subject to a Large Delay in a Laser System
Hopf bifurcation theory for an oscillator subject to a weak feedback but a large delay is investigated for a specific laser system. The problem is motivated by semiconductor laser ...
Athanasios Gavrielides, Didier Pieroux, Thomas Ern...
SIAMDM
1998
95views more  SIAMDM 1998»
13 years 8 months ago
The Graphs with All Subgraphs T-Perfect
The richest class of t-perfect graphs known so far consists of the graphs with no so-called odd-K4. Clearly, these graphs have the special property that they are hereditary t-perfe...
A. M. H. Gerards, F. Bruce Shepherd
RSA
2002
99views more  RSA 2002»
13 years 8 months ago
Distributed algorithms with dynamical random transitions
Given any measure-preserving dynamical system (Y, A , , T) and g Lp() , we study convergence of the sequence 1 n n k=1 g TSk , n 1 where Sk is a dynamic Zr -valued random w...
Nadine Guillotin-Plantard, René Schott