Sciweavers

66 search results - page 10 / 14
» Generic Constructions for Strong Designated Verifier Signatu...
Sort
View
SPW
2004
Springer
14 years 21 days ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson
ACISP
2009
Springer
14 years 1 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
PLDI
2003
ACM
14 years 18 days ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...
ICRA
2008
IEEE
143views Robotics» more  ICRA 2008»
14 years 1 months ago
Pattern generators with sensory feedback for the control of quadruped locomotion
— Central Pattern Generators (CPGs) are becoming a popular model for the control of locomotion of legged robots. Biological CPGs are neural networks responsible for the generatio...
Ludovic Righetti, Auke Jan Ijspeert
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 1 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...