Sciweavers

1249 search results - page 149 / 250
» Limitations of the Even-Mansour Construction
Sort
View
CP
2009
Springer
14 years 11 months ago
Constraint-Based Optimal Testing Using DNNF Graphs
The goal of testing is to distinguish between a number of hypotheses about a systemfor example, dierent diagnoses of faults by applying input patterns and verifying or falsifying t...
Anika Schumann, Martin Sachenbacher, Jinbo Huang
CCS
2009
ACM
14 years 11 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
KDD
2002
ACM
130views Data Mining» more  KDD 2002»
14 years 11 months ago
Learning domain-independent string transformation weights for high accuracy object identification
The task of object identification occurs when integrating information from multiple websites. The same data objects can exist in inconsistent text formats across sites, making it ...
Sheila Tejada, Craig A. Knoblock, Steven Minton
POPL
2006
ACM
14 years 11 months ago
Small bisimulations for reasoning about higher-order imperative programs
We introduce a new notion of bisimulation for showing contextual equivalence of expressions in an untyped lambda-calculus with an explicit store, and in which all expressed values...
Vasileios Koutavas, Mitchell Wand
STOC
2003
ACM
142views Algorithms» more  STOC 2003»
14 years 11 months ago
Optimal probabilistic fingerprint codes
We construct binary codes for fingerprinting. Our codes for n users that are -secure against c pirates have length O(c2 log(n/ )). This improves the codes proposed by Boneh and Sh...
Gábor Tardos