Sciweavers

1274 search results - page 202 / 255
» New Proofs for
Sort
View
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Oblivious Transfer and Linear Functions
Abstract. We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiv...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
14 years 1 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
ESWS
2006
Springer
14 years 1 months ago
Ontology Engineering Revisited: An Iterative Case Study
Existing mature ontology engineering approaches are based on some basic assumptions that are often violated in practice, in particular in the Semantic Web. Ontologies often need to...
Christoph Tempich, Helena Sofia Pinto, Steffen Sta...
FMCAD
2006
Springer
14 years 1 months ago
Finite Instantiations for Integer Difference Logic
The last few years have seen the advent of a new breed of decision procedures for various fragments of first-order logic based on ional abstraction. A lazy satisfiability checker ...
Hyondeuk Kim, Fabio Somenzi
FOSSACS
2006
Springer
14 years 1 months ago
A Logic of Reachable Patterns in Linked Data-Structures
We define a new decidable logic for expressing and checking invariants of programs that manipulate dynamically-allocated objects via pointers and destructive pointer updates. The ...
Greta Yorsh, Alexander Moshe Rabinovich, Mooly Sag...