Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment ofâ€¦ (More)

Hidden credentials are useful in protecting sensitive resource requests, resources, policies, and credentials. We propose a significant performance improvement when implementing hidden credentialsâ€¦ (More)

Thermal energy storage can enhance the utility of parabolic trough solar power plants by providing the ability to match electrical output to peak demand periods. An important component of thermalâ€¦ (More)

Colemanâ€™s theory of p-adic integration figures prominently in several number-theoretic applications, such as finding torsion and rational points on curves, and computing p-adic regulators in K-theoryâ€¦ (More)

We present a method of computing with matrices over very small finite fields of size larger than 2. Specifically, we show how the Method of Four Russians can be efficiently adapted to these largerâ€¦ (More)

A cooperative program between Sandia National Laboratories (SNL) and the SRT Group was recently begun to advance the development of a chemical process to produce hydrobromic acid from bromine andâ€¦ (More)

Advances are reported in several aspects of clathrate hydrate desalination fundamentals necessary to develop an economical means to produce municipal quantities of potable water from seawater orâ€¦ (More)

However, there are various other ways of defining Bn which indicate its importance in many fields of mathematics [1]. In particular, braid groups are useful in defining invariants of knots and linksâ€¦ (More)