Sciweavers

317 search results - page 30 / 64
» Who gives a tweet
Sort
View
ISSAC
2007
Springer
99views Mathematics» more  ISSAC 2007»
14 years 3 months ago
Computing monodromy via parallel homotopy continuation
Numerical homotopy continuation gives a powerful tool for the applied scientist who seeks solutions to a system of polynomial equations. Techniques from numerical homotopy continu...
Anton Leykin, Frank Sottile
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
14 years 3 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
WAIFI
2007
Springer
110views Mathematics» more  WAIFI 2007»
14 years 3 months ago
On Kabatianskii-Krouk-Smeets Signatures
Kabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme based on random error-correcting codes. In this paper we investigate the security and the efficiency of ...
Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud
COMSWARE
2006
IEEE
14 years 2 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
ELPUB
2006
ACM
14 years 2 months ago
Living Reviews - Innovative Resources for Scholarly Communication Bridging Diverse Spheres of Disciplines and Organisational Str
This contribution presents the concept and analyses the path of diffusion of an innovative publishing idea that originated in one speciality in physics and is now about to spread ...
Claus Dalchow, Michael Nentwich, Patrick Scherhauf...