Sciweavers

2715 search results - page 146 / 543
» Database Publication Practices
Sort
View
EUROCRYPT
2000
Springer
13 years 11 months ago
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model
We show that if any one-way function exists, then 3-round concurrent zero-knowledge arguments for all NP problems can be built in a model where a short auxiliary string with a pres...
Ivan Damgård
CHI
1995
ACM
13 years 11 months ago
Belvedere: stimulating students' critical discussion
We describe “Belvedere,” a system to support students engaged in critical discussion of science and public policy issues. The design is intended to address cognitive and metac...
Massimo Paolucci, Daniel D. Suthers, Arlene Weiner
CCS
2008
ACM
13 years 10 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar
ICISC
2007
125views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama
AIL
2006
92views more  AIL 2006»
13 years 8 months ago
PARMENIDES: Facilitating Deliberation in Democracies
Governments and other groups interested in the views of citizens require the means to present justifications of proposed actions, and the means to solicit public opinion concerning...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...