Sciweavers

324 search results - page 63 / 65
» Model Transformations in Practice Workshop
Sort
View
NDSS
2003
IEEE
14 years 11 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
COMPGEOM
2003
ACM
14 years 10 days ago
The smallest enclosing ball of balls: combinatorial structure and algorithms
We develop algorithms for computing the smallest enclosing ball of a set of n balls in d-dimensional space. Unlike previous methods, we explicitly address small cases (n ā‰¤ d + 1...
Kaspar Fischer, Bernd Gärtner
AGTIVE
2003
Springer
14 years 10 days ago
Specifying Pointer Structures by Graph Reduction
Graph-reduction speciļ¬cations (GRSs) are a powerful new method for specifying classes of pointer data structures (shapes). They cover important shapes, like various forms of bal...
Adam Bakewell, Detlef Plump, Colin Runciman
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 9 days ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
ICIP
1997
IEEE
13 years 10 months ago
Object Based Video with Progressive Foreground
A novel algorithm is described for coding objects in video compression systems which gives complete control over the bit allocation to the video objects. The method is evaluated b...
Donald M. Monro, Huijuan Li, J. A. Nicholls