Sciweavers

1833 search results - page 21 / 367
» Mechanized Verification with Sharing
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 11 months ago
Recursive Secret Sharing for Distributed Storage and Information Hiding
Abstract--This paper presents a recursive computational multisecret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such tha...
Abhishek Parakh, Subhash Kak
AES
2008
Springer
97views Cryptology» more  AES 2008»
13 years 10 months ago
Software mechanisms for extensible and scalable 3D visualization of construction operations
This paper presents research that led to the design and implementation of an extensible and scalable software framework for the dynamic 3D visualization of simulated construction ...
Vineet R. Kamat, Julio C. Martínez
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 11 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
14 years 4 months ago
Sufficiency verification of HIV-1 pathogenesis based on multi-agent simulation
Researchers of HIV-1 are today, still unable to determine exactly the biological mechanisms that cause AIDS. Various mechanisms have been hypothesized and their existences have be...
Zaiyi Guo, Hann Kwang Han, Joc Cing Tay
POPL
2008
ACM
14 years 11 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk