Sciweavers

9370 search results - page 32 / 1874
» An Abstract Notion of Application
Sort
View
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
14 years 4 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
ICALP
2005
Springer
14 years 3 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
WSC
1998
13 years 11 months ago
Simulation Modeling at Multiple Levels of Abstraction
ON MODELING AT MULTIPLE LEVELS OF ABSTRACTION Perakath Benjamin Madhav Erraguntla Dursun Delen Richard Mayer Knowledge Based Systems, Inc. 1408 University Drive College Station, Te...
Perakath C. Benjamin, Madhav Erraguntla, Dursun De...
AGP
1994
IEEE
14 years 2 months ago
An Abstract Interpretation Framework for (almost) Full Prolog
act Interpretation Framework for (almost) Full Prolog1 B. Le Charlier S. Rossi P. Van Hentenryck University of Namur University of Padova Brown University 21 rue Grandgagnage 7 via...
Baudouin Le Charlier, Sabina Rossi, Pascal Van Hen...
ESOP
2005
Springer
14 years 3 months ago
Java Jr: Fully Abstract Trace Semantics for a Core Java Language
: Fully abstract trace semantics for a core Java language. Alan Jeffrey 1,2 and Julian Rathke3 1 Bell Labs, Lucent Technologies, Chicago, IL, USA 2 DePaul University, Chicago, IL, ...
Alan Jeffrey, Julian Rathke