Sciweavers

156 search results - page 14 / 32
» On the notion of uniqueness
Sort
View
IACR
2011
152views more  IACR 2011»
12 years 9 months ago
Rational distance-bounding protocols over noisy channels
We use ideas from game theory to define a new notion for an optimal threshold for the number of erroneous responses that occur during the rapid-bit exchange over noisy channels i...
Long H. Nguyen
PODS
2005
ACM
104views Database» more  PODS 2005»
14 years 10 months ago
Views and queries: determinacy and rewriting
We investigate the question of whether a query can be answered using a set V of views. We first define the problem in information-theoretic terms: we say that V determines if V pr...
Luc Segoufin, Victor Vianu
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
14 years 3 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
ECSQARU
2001
Springer
14 years 2 months ago
How to Reason Credulously and Skeptically within a Single Extension
Abstract. Consistency-based approaches in nonmonotonic reasoning may be expected to yield multiple sets of default conclusions for a given default theory. Reasoning about such exte...
James P. Delgrande, Torsten Schaub
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 11 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo