Sciweavers

1274 search results - page 74 / 255
» New Proofs for
Sort
View
FCT
2003
Springer
14 years 28 days ago
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra ...
Michele Bugliesi, Ambra Ceccato, Sabina Rossi
COMBINATORICA
2008
129views more  COMBINATORICA 2008»
13 years 7 months ago
The combinatorial encoding of disjoint convex sets in the plane
We introduce a new combinatorial object, the double-permutation sequence, and use it to encode a family of mutually disjoint compact convex sets in the plane in a way that capture...
Jacob E. Goodman, Richard Pollack
DMTCS
2007
74views Mathematics» more  DMTCS 2007»
13 years 7 months ago
Words and Bisimulations of Dynamical Systems
In this paper we study bisimulations on dynamical systems through a given partition. Our aim is to give a new vision of the notion of bisimulation by using words. To achieve this g...
Thomas Brihaye
RSA
2010
113views more  RSA 2010»
13 years 6 months ago
The order of the giant component of random hypergraphs
We establish central and local limit theorems for the number of vertices in the largest component of a random d-uniform hypergraph Hd(n, p) with edge probability p = c/ n−1 d−1...
Michael Behrisch, Amin Coja-Oghlan, Mihyun Kang
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
14 years 1 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi