Sciweavers

52 search results - page 7 / 11
» On the Analysis of Cryptographic Assumptions in the Generic ...
Sort
View
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 1 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
WETICE
1995
IEEE
13 years 11 months ago
An Ontology of Quality for Enterprise Modelling
Although there are many quality domains in which ideas and concepts about quality are represented, these representations are often informal. The TOVE Quality Ontology is the forma...
Henry M. Kim, Mark S. Fox, Michael Grüninger
FSTTCS
2009
Springer
14 years 1 months ago
Functionally Private Approximations of Negligibly-Biased Estimators
ABSTRACT. We study functionally private approximations. An approximation function g is functionally private with respect to f if, for any input x, g(x) reveals no more information ...
André Madeira, S. Muthukrishnan
ICPPW
2002
IEEE
14 years 9 days ago
Quantitative Analysis of Transmission Power Control in Wireless Ad-hoc Networks
Abstract—In this paper, we address the issue of transmission power control in wireless ad-hoc networks. In general, it is assumed that minimum transmission power achieves the opt...
Seung-Jong Park, Raghupathy Sivakumar
CCS
2009
ACM
14 years 2 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal