Sciweavers

1898 search results - page 37 / 380
» Weak Keys for IDEA
Sort
View
130
Voted
TCS
2008
15 years 3 months ago
Using bisimulation proof techniques for the analysis of distributed abstract machines
Analysis of Distributed Abstract Machines Damien Pous ENS Lyon, France. We illustrate the use of recently developed proof techniques for weak bisimulation sing a generic framework...
Damien Pous
146
Voted
CSI
2010
232views more  CSI 2010»
15 years 2 months ago
Advanced smart card based password authentication protocol
Song [8] proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme...
Ronggong Song
93
Voted
AUTOMATICA
2006
67views more  AUTOMATICA 2006»
15 years 3 months ago
Numerical methods for controlled regime-switching diffusions and regime-switching jump diffusions
This work is concerned with numerical methods for controlled regime-switching diffusions, and regime-switching jump diffusions. Numerical procedures based on Markov chain approxim...
Q. S. Song, Gang George Yin, Z. Zhang
105
Voted
AIMS
2007
Springer
15 years 9 months ago
Peer-to-Peer Large-Scale Collaborative Storage Networks
Abstract. This paper presents the idea of a fully decentralized peer-to-peer collaborative network with a robust, scalable and incentive-compatible system enabling storage, retriev...
Thomas Bocek, Burkhard Stiller
124
Voted
RE
2006
Springer
15 years 3 months ago
Goal-Oriented Requirements Engineering, Part II
We briefly review the history and key ideas in Goal-Oriented Requirements Engineering research. We then sketch two applications of these ideas. The first involves establishing an ...
John Mylopoulos