Sciweavers

793 search results - page 109 / 159
» Argumentation and standards of proof
Sort
View
ESORICS
2007
Springer
14 years 5 months ago
On the Privacy of Concealed Data Aggregation
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are stil...
Aldar C.-F. Chan, Claude Castelluccia
IPPS
2006
IEEE
14 years 5 months ago
Communication concept for adaptive intelligent run-time systems supporting distributed reconfigurable embedded systems
Reconfigurable computing systems have already shown their abilities to accelerate embedded hardware/ software systems. Since standard processor-based embedded applications have co...
M. Ullmann, J. Becker
FCT
2005
Springer
14 years 4 months ago
Deterministic Automata on Unranked Trees
Abstract. We investigate bottom-up and top-down deterministic automata on unranked trees. We show that for an appropriate definition of bottom-up deterministic automata it is poss...
Julien Cristau, Christof Löding, Wolfgang Tho...
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
14 years 4 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
TPHOL
2003
IEEE
14 years 4 months ago
Inductive Invariants for Nested Recursion
Abstract. We show that certain input-output relations, termed inductive invariants are of central importance for termination proofs of algorithms defined by nested recursion. Indu...
Sava Krstic, John Matthews