Sciweavers

674 search results - page 86 / 135
» Arguments and Results
Sort
View
ATAL
2007
Springer
14 years 21 days ago
Reputation in the joint venture game
In many settings, agents need to identify competent partners to assist them in accomplishing tasks. Direct experience may not provide sufficient data to learn the competence of ot...
Philip Hendrix, Barbara J. Grosz
ANTS
2006
Springer
127views Algorithms» more  ANTS 2006»
14 years 13 days ago
Doubly-Focused Enumeration of Pseudosquares and Pseudocubes
This paper offers numerical evidence for a conjecture that primality proving may be done in (log N)3+o(1) operations by examining the growth rate of quantities known as pseudosquar...
Kjell Wooding, Hugh C. Williams
ASIACRYPT
2006
Springer
14 years 13 days ago
On the Security of OAEP
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Alexandra Boldyreva, Marc Fischlin
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
14 years 11 days ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
ECIS
2001
13 years 10 months ago
Using Intranet technology to foster organizational knowledge creation
Many organizations have embraced intranets with the intent to harness the technology to support knowledge management initiatives. Despite the promise that intranet technology hold...
Jan Damsgaard, Rens Scheepers