Sciweavers

490 search results - page 62 / 98
» Impossibilities for roommate problems
Sort
View
EUROCRYPT
2005
Springer
14 years 2 months ago
Universally Composable Password-Based Key Exchange
Abstract. We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC) security, thus providing security guar...
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Li...
GECCO
2005
Springer
175views Optimization» more  GECCO 2005»
14 years 2 months ago
Inverse multi-objective robust evolutionary design optimization in the presence of uncertainty
In many real-world design problems, uncertainties are often present and practically impossible to avoid. Many existing works on Evolutionary Algorithm (EA) for handling uncertaint...
Dudy Lim, Yew-Soon Ong, Bu-Sung Lee
ICALP
2005
Springer
14 years 2 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
IFM
2005
Springer
100views Formal Methods» more  IFM 2005»
14 years 2 months ago
Embedding the Stable Failures Model of CSP in PVS
We present an embedding of the stable failures model of CSP in the PVS theorem prover. Our work, extending a previous embedding of the traces model of CSP in [6], provides a platfo...
Kun Wei, James Heather
WDAG
2005
Springer
118views Algorithms» more  WDAG 2005»
14 years 2 months ago
Distributed Computing with Imperfect Randomness
Randomness is a critical resource in many computational scenarios, enabling solutions where deterministic ones are elusive or even provably impossible. However, the randomized solu...
Shafi Goldwasser, Madhu Sudan, Vinod Vaikuntanatha...