Sciweavers

11063 search results - page 62 / 2213
» On the existence of universal models
Sort
View
EUROCRYPT
2005
Springer
14 years 3 months ago
Universally Composable Password-Based Key Exchange
Abstract. We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC) security, thus providing security guar...
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Li...
WSC
1997
13 years 11 months ago
Applications of the Universal Joint Task List to Joint Exercise Results
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...
ASIAMS
2009
IEEE
13 years 11 months ago
Uncovering Hidden Information Within University's Student Enrollment Data Using Data Mining
To date, higher educational organizations are placed in a very high competitive environment. To remain competitive, one approach is to tackle the student and administration challen...
Fadzilah Siraj, Mansour Ali Abdoulha
CORR
2008
Springer
96views Education» more  CORR 2008»
13 years 10 months ago
New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures
The concept of universal designated verifier signatures was introduced by Steinfeld, Bull, Wang and Pieprzyk at Asiacrypt 2003. These signatures can be used as standard publicly ve...
Damien Vergnaud
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
14 years 4 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz