• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 101
Next 10 →

DOCTEUR EN SCIENCES

by Bhaskar Biswas, Bhaskar Biswas , 2010
"... Implementational aspects of code-based cryptography ..."
Abstract - Add to MetaCart
Implementational aspects of code-based cryptography

AGR 05

by Università Degli, Studi Della Tuscia, Dottorato Di Ricerca, Candidato Tutori, Alessandra Lagomarsino, Prof Paolo, De Angelis, Prof Stefano Grego, Prof Paolo, De Angelis
"... Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation ..."
Abstract - Add to MetaCart
Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation

An Infinite Set of Ward Identities for Adiabatic Modes in Cosmology

by Kurt Hinterbichlera, Lam Huib, Justin Khouryc
"... We show that the correlation functions of any single-field cosmological model with constant growing-modes are constrained by an infinite number of novel consistency relations, which relate N + 1-point correlation functions with a soft-momentum scalar or tensor mode to a symmetry transformation on N- ..."
Abstract - Add to MetaCart
are new. As a check, we verify directly that the n = 2 identity is satisfied by known correlation functions in slow-roll inflation. ar X iv

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork

by Xavier Boyen , Brent Waters - CRYPTO 2006. LNCS, , 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract - Cited by 119 (10 self) - Add to MetaCart
T for an identity Id ∈ Z × p works as follows. The algorithm chooses random exponents s, s 1 , s 2 ∈ Z p , and creates the ciphertext as: Decrypt(Pvk Id , C) The decryption algorithm attempts to decrypt a ciphertext CT by computing: Proving Security. We prove security using a hybrid experiment. Let [C , C 0 , C 1

TO CODE OR NOT TO CODE

by Présentée À La, Faculté Informatique, Et Communications, Section Des, Systèmes De Communication, Du Grade, De Docteur, Ès Sciences, Prof M. Vetterli, Prof B. Rimoldi, Prof R. Gallager, Prof A. Lapidoth, Prof J. Massey, Prof E. Telatar, Prof S. Verdú, Michael Gastpar, Amos Lapidoth, Jim Ma , 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract - Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:

unknown title

by unknown authors
"... ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi- ..."
Abstract - Add to MetaCart
ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi-

Composition du Jury

by Eric Chaumette, Cédric Richard, Professeur Universités, Yannick Berthoumieu, Professeur Universités, Pascal Chevalier Professeur, Pascal Larzabal, Professeur Universités
"... Caractérisation des problèmes conjoints de détection et d'estimation ..."
Abstract - Add to MetaCart
Caractérisation des problèmes conjoints de détection et d'estimation

Using BubbleStorm Accepted Master-Thesis from Marcel Lucas

by Assessor Prof Alej, Ro P. Buchmann, Ph. D
"... Hiermit versichere ich, die vorliegende Master-Thesis ohne Hilfe Dritter nur mit den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehö ..."
Abstract - Add to MetaCart
of scalability and maintainability. Hence, different approaches are based on Peer-to-Peer (P2P) technology. In particular, fast-paced NVEs stress these systems and most likely cause high overlay maintenance overhead. This Master’s Thesis presents a novel approach to spatial Publish/Subscribe (Pub/Sub) in P2P

Proceedings of the Workshop on Virtual Documents, Hypertext Functionality and the Web, Eighth International World Wide Web Conference Tuesday May 11, 1999 - Toronto, Canada

by Maria Milosavljevic, Fabio Vitali, Carolyn Watters (eds.) , 1999
"... s are available from the same host in the directory /pub/TR/UBLCS/ABSTRACTS in plain text format. All local authors can be reached via e-mail at the address last-name@cs.unibo.it. Recent titles from the UBLCS Technical Report Series 97-6 A Process Algebraic View of Linda Coordination Primitives, N ..."
Abstract - Add to MetaCart
-9 Generalized Semi-Markovian Process Algebra, M. Bravetti, M. Bernardo, R. Gorrieri, October 1997. 98-1 Group Communication in Partitionable Systems: Specification and Algorithms, Ö. Babaoglu, R. Davoli, A. Montresor, April 1998. 98-2 A Catalog of Architectural Styles for Mobility, P. Ciancarini, C. Mascolo

von

by Mathematisch-naturwissenschaftlichen Fakultät, Stefan Lange, Prof Dr, Jan-hendrik Olbertz, Prof Dr, Elmar Kulke
"... eingereicht an der ..."
Abstract - Add to MetaCart
eingereicht an der
Next 10 →
Results 1 - 10 of 101
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University