Sciweavers

1058 search results - page 150 / 212
» It's Doomed; We Can Prove It
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 4 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
AGTIVE
2007
Springer
14 years 4 months ago
A Single-Step Term-Graph Reduction System for Proof Assistants
In this paper, we will define a custom term-graph reduction system for a simplified lazy functional language. Our custom system is geared towards flexibility, which is accomplis...
Maarten de Mol, Marko C. J. D. van Eekelen, Rinus ...
TCC
2007
Springer
124views Cryptology» more  TCC 2007»
14 years 4 months ago
Tackling Adaptive Corruptions in Multicast Encryption Protocols
We prove a computational soundness theorem for symmetric-key encryption protocols that can be used to analyze security against adaptively corrupting adversaries (that is, adversar...
Saurabh Panjwani
UCS
2007
Springer
14 years 4 months ago
Detection of User Mode Shift in Home
A ubiquitous environment enable us to enjoy various services “anytime” ”anywhere”. However, “everyone” is not realized. We research an intelligent space “everyone” ...
Hiroyuki Yamahara, Hideyuki Takada, Hiromitsu Shim...
APCSAC
2005
IEEE
14 years 3 months ago
Rule-Based Power-Balanced VLIW Instruction Scheduling with Uncertainty
Abstract. Power-balanced instruction scheduling for Very Long Instruction Word (VLIW) processors is an optimization problem which requires a good instruction-level power model for ...
Shu Xiao, Edmund Ming-Kit Lai, A. Benjamin Premkum...