<--- Back to Details
First PageDocument Content
Dining cryptographers problem / Connected component / Tree / Induced path / Vertex / Public-key cryptography / Graph / Graph theory / Mathematics / Cryptography
Date: 2007-03-31 14:33:35
Dining cryptographers problem
Connected component
Tree
Induced path
Vertex
Public-key cryptography
Graph
Graph theory
Mathematics
Cryptography

J. Cryptology[removed]:[removed]Journal of Cryptology

Add to Reading List

Source URL: www.cs.ucsb.edu

Download Document from Source Website

File Size: 700,95 KB

Share Document on Facebook

Similar Documents

Properness defects of projections and computation of one point in each connected component of a real algebraic set Mohab Safey El Din, LIP6, Universit´e Paris 6, France ´

DocID: 1uB8l - View Document

EVERY CONNECTED SUM OF LENS SPACES IS A REAL COMPONENT OF A UNIRULED ALGEBRAIC VARIETY ´ ERIC ´ JOHANNES HUISMAN AND FRED MANGOLTE

DocID: 1s41l - View Document

Properness defects of projections and computation of one point in each connected component of a real algebraic set Mohab Safey El Din, LIP6, Universit´e Paris 6, France ´

DocID: 1rKne - View Document

Graph theory / Graph connectivity / Mathematics / 3D graphics software / Point Cloud Library / Image segmentation / Printer Command Language / Graph / Connected component / Random walk / Book:Graph Theory

Semi-automatic point cloud segmentation Sergey Alexandrov PCL Tutorial – IAS 2014 Semi-automatic segmentation

DocID: 1rshE - View Document

Graph theory / Mathematics / Graph / Centrality / Vertex / Bipartite graph / Adjacency matrix / Adjacency list / Directed acyclic graph / Directed graph / Connected component / Tree

Network Analysis and Modeling Lectures 1 and 2 Prof. Aaron Clauset 1

DocID: 1rmNc - View Document