Sciweavers

1274 search results - page 80 / 255
» New Proofs for
Sort
View
IMTCI
2004
Springer
15 years 9 months ago
Mobile Agents: Preserving Privacy and Anonymity
The paper presents two new methods for providing mobile agents with privacy and anynomity. The proposed schemes are based on different cryptographic primitives: a secret-sharing s...
Aneta Zwierko, Zbigniew Kotulski
CSFW
1999
IEEE
15 years 8 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
ALP
1992
Springer
15 years 8 months ago
On the Relation Between Primitive Recursion, Schematization and Divergence
The paper presents a new schematization of in nite families of terms called the primal grammars, based on the notion of primitive recursive rewrite systems. This schematization is...
Miki Hermann
CTRS
1990
15 years 8 months ago
A Maximal-Literal Unit Strategy for Horn Clauses
A new positive-unit theorem-proving procedure for equational Horn clauses is presented. It uses a term ordering to restrict paxamodulation to potentiallymaximal sides of equations...
Nachum Dershowitz
CORR
2008
Springer
79views Education» more  CORR 2008»
15 years 4 months ago
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
In this note we give a precise formulation of "resistance to arbitrary side information" and show that several relaxations of differential privacy imply it. The formulat...
Shiva Prasad Kasiviswanathan, Adam Smith