Sciweavers

1557 search results - page 34 / 312
» What can we do with a Solution
Sort
View
ASIACRYPT
2000
Springer
13 years 12 months ago
Towards Signature-Only Signature Schemes
We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infr...
Adam Young, Moti Yung
SIGECOM
2005
ACM
122views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Robust solutions for combinatorial auctions
Bids submitted in auctions are usually treated as enforceable commitments in most bidding and auction theory literature. In reality bidders often withdraw winning bids before the ...
Alan Holland, Barry O'Sullivan
IJCSS
2006
110views more  IJCSS 2006»
13 years 7 months ago
Business Engineering with Mobile Workforce Solutions
An analysis framework is presented that can be used to assess important issues of mobile workforce solutions, based on recent literature on mobile business. Within this framework ...
Yan Wang, Elisabeth van de Kar, Geleyn R. Meijer, ...
AMC
2006
88views more  AMC 2006»
13 years 7 months ago
Invariant solutions of certain nonlinear evolution type equations with small parameters
The Fisher equation, which arises in the study of reaction diffusion waves in biology, does not display a high level of symmetry properties. Consequently, only travelling wave sol...
Ashfaque H. Bokhari, Abdul Hamid Kara, F. D. Zaman
IPPS
2006
IEEE
14 years 1 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti