Sciweavers

1898 search results - page 37 / 380
» Weak Keys for IDEA
Sort
View
TCS
2008
13 years 8 months ago
Using bisimulation proof techniques for the analysis of distributed abstract machines
Analysis of Distributed Abstract Machines Damien Pous ENS Lyon, France. We illustrate the use of recently developed proof techniques for weak bisimulation sing a generic framework...
Damien Pous
CSI
2010
232views more  CSI 2010»
13 years 7 months ago
Advanced smart card based password authentication protocol
Song [8] proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme...
Ronggong Song
AUTOMATICA
2006
67views more  AUTOMATICA 2006»
13 years 8 months ago
Numerical methods for controlled regime-switching diffusions and regime-switching jump diffusions
This work is concerned with numerical methods for controlled regime-switching diffusions, and regime-switching jump diffusions. Numerical procedures based on Markov chain approxim...
Q. S. Song, Gang George Yin, Z. Zhang
AIMS
2007
Springer
14 years 2 months ago
Peer-to-Peer Large-Scale Collaborative Storage Networks
Abstract. This paper presents the idea of a fully decentralized peer-to-peer collaborative network with a robust, scalable and incentive-compatible system enabling storage, retriev...
Thomas Bocek, Burkhard Stiller
RE
2006
Springer
13 years 8 months ago
Goal-Oriented Requirements Engineering, Part II
We briefly review the history and key ideas in Goal-Oriented Requirements Engineering research. We then sketch two applications of these ideas. The first involves establishing an ...
John Mylopoulos