Sciweavers

52 search results - page 4 / 11
» On the Analysis of Cryptographic Assumptions in the Generic ...
Sort
View
CRYPTO
2011
Springer
232views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Structure-preserving signatures are signatures defined over bilinear groups that rely on generic group operations. In particular, the messages and signatures consist of group elem...
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, M...
SIAMADS
2010
122views more  SIAMADS 2010»
13 years 2 months ago
Local/Global Analysis of the Stationary Solutions of Some Neural Field Equations
Neural or cortical fields are continuous assemblies of mesoscopic models, also called neural masses, of neural populations that are fundamental in the modeling of macroscopic parts...
Romain Veltz, Olivier D. Faugeras
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
12 years 11 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CORR
2006
Springer
105views Education» more  CORR 2006»
13 years 7 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
IFIP
2004
Springer
14 years 22 days ago
The Driving Philosophers
We introduce a new synchronization problem in mobile ad-hoc systems: the Driving Philosophers. In this problem, an unbounded number of driving philosophers (processes) access a rou...
Sébastien Baehni, Roberto Baldoni, Rachid G...