Sciweavers

849 search results - page 24 / 170
» Completely Non-malleable Schemes
Sort
View
ACISP
2000
Springer
14 years 3 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
JSAC
2006
90views more  JSAC 2006»
13 years 11 months ago
Multicode ultra-wideband scheme using chirp waveforms
We propose an ultra-wideband (UWB) scheme that employs chirp waveforms. Signals satisfying the Federal Communications Commission (FCC) requirements for UWB applications are formed ...
Huaping Liu
VLDB
2005
ACM
74views Database» more  VLDB 2005»
14 years 4 months ago
Designing Information-Preserving Mapping Schemes for XML
An XML-to-relational mapping scheme consists of a procedure for shredding XML documents into relational databases, a procedure for publishing databases back as documents, and a se...
Denilson Barbosa, Juliana Freire, Alberto O. Mende...
ECAL
2005
Springer
14 years 4 months ago
Comparative Reproduction Schemes for Evolving Gathering Collectives
This research investigates an evolutionary approach to engineering agent collectives that accomplish tasks cooperatively. In general, reproduction and selection form the two corner...
A. E. Eiben, Geoff Nitschke, Martijn C. Schut
JFP
2008
109views more  JFP 2008»
13 years 11 months ago
An operational semantics for Scheme
This paper presents an operational semantics for the core of Scheme. Our specification improves over the denotational semantics from the Revised5 Report on Scheme specification in...
Jacob Matthews, Robert Bruce Findler