Sciweavers

2478 search results - page 235 / 496
» Message from the Chair
Sort
View
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger
STACS
2005
Springer
15 years 10 months ago
Quantum Interactive Proofs with Competing Provers
This paper studies quantum refereed games, which are quantum interactive proof systems with two competing provers: one that tries to convince the verifier to accept and the other...
Gus Gutoski, John Watrous
ACISP
2004
Springer
15 years 10 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim
AMAI
2004
Springer
15 years 10 months ago
Multi-Agent Dialogue Protocols
In this paper we propose a new agent communication language which separates agent dialogue from any specific agent reasoning technology. This language is intended to address a nu...
Christopher D. Walton
HOLOMAS
2003
Springer
15 years 10 months ago
Integration of Automation Resources in Holonic Manufacturing Applications
Holonic and agent-based paradigms are very suitable in the development of distributed manufacturing control systems, taking advantage of their modularity, decentralization, and abi...
Paulo Leitão, Raymond Boissier, Francisco C...