Sciweavers

3328 search results - page 50 / 666
» On Plateaued Functions and Their Constructions
Sort
View
TCC
2009
Springer
160views Cryptology» more  TCC 2009»
14 years 9 months ago
Simple, Black-Box Constructions of Adaptively Secure Protocols
We present a compiler for transforming an oblivious transfer (OT) protocol secure against an adaptive semi-honest adversary into one that is secure against an adaptive malicious ad...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
COMPSAC
2002
IEEE
14 years 1 months ago
Constructing an EJB Application in a WFMS
A workflow system provides enterprises the automatic and paperless process management. The idea of Enterprise JavaBeans (EJB) is to utilize components from various vendors to cons...
Jian-Wei Wang, Ta-Chun Lin, Hwai-Jong Hsu, Feng-Ji...
CRYPTO
2001
Springer
117views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
Online Ciphers and the Hash-CBC Construction
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having p...
Mihir Bellare, Alexandra Boldyreva, Lars R. Knudse...
ESA
2006
Springer
134views Algorithms» more  ESA 2006»
14 years 15 days ago
An Improved Construction for Counting Bloom Filters
A counting Bloom filter (CBF) generalizes a Bloom filter data structure so as to allow membership queries on a set that can be changing dynamically via insertions and deletions. As...
Flavio Bonomi, Michael Mitzenmacher, Rina Panigrah...
WSC
2007
13 years 11 months ago
Domain specific model constructs in commercial simulation environments
Commercial simulation environments offer model developers the ability to compose simulation models using generic or domain specific model constructs. Most simulation environments ...
Edwin Valentin, Alexander Verbraeck