Sciweavers

893 search results - page 67 / 179
» Environment Assumptions for Synthesis
Sort
View
PKC
2009
Springer
115views Cryptology» more  PKC 2009»
14 years 8 months ago
Compact CCA-Secure Encryption for Messages of Arbitrary Length
This paper proposes a chosen-ciphertext secure variant of the ElGamal public-key encryption scheme which generates very compact ciphertexts for messages of arbitrary length. The ci...
Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto
STOC
2004
ACM
117views Algorithms» more  STOC 2004»
14 years 8 months ago
New notions of security: achieving universal composability without trusted setup
We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion, involves comparing the protocol executions with an ideal execution involvin...
Manoj Prabhakaran, Amit Sahai
ICDCS
2006
IEEE
14 years 1 months ago
Computing in the Presence of Timing Failures
Timing failures refer to a situation where the environment in which a system operates does not behave as expected regarding the timing assumptions, that is, the timing constraints...
Gadi Taubenfeld
WOWMOM
2005
ACM
195views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks
The vast majority of mobile ad hoc networking research makes a very large assumption: that communication can only take place between nodes that are simultaneously accessible withi...
Mirco Musolesi, Stephen Hailes, Cecilia Mascolo
ISMAR
2003
IEEE
14 years 1 months ago
The Effects of Shadow Representation of Virtual Objects in Augmented Reality
In this paper, we describe the effects of shadow representation of virtual objects in Augmented Reality. Optical consistency is important in order to create realistic augmented re...
Natsuki Sugano, Hirokazu Kato, Keihachiro Tachiban...