Sciweavers

1898 search results - page 83 / 380
» Weak Keys for IDEA
Sort
View
AML
2005
65views more  AML 2005»
13 years 8 months ago
Middle diamond
Under certain cardinal arithmetic assumptions, we prove that for every large enough regular cardinal, for many regular < , many stationary subsets of concentrating on cofinali...
Saharon Shelah
TWC
2008
143views more  TWC 2008»
13 years 8 months ago
Mobile Privacy in Wireless Networks-Revisited
Abstract-- With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protectin...
Caimu Tang, Dapeng Oliver Wu
COMPSEC
2004
99views more  COMPSEC 2004»
13 years 8 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...
CPC
2002
80views more  CPC 2002»
13 years 8 months ago
The Wiener Index Of Random Trees
The Wiener index is analyzed for random recursive trees and random binary search trees in the uniform probabilistic models. We obtain the expectations, asymptotics for the varianc...
Ralph Neininger
IJON
2000
73views more  IJON 2000»
13 years 8 months ago
A recurrent network model for the phase invariance of complex cell responses
Cortical amplification is a mechanism for modifying the selectivity of neurons through recurrent interactions. Although conventionally used to enhance selectivity, cortical amplif...
Frances S. Chance, Sacha B. Nelson, L. F. Abbott