Sciweavers

989 search results - page 111 / 198
» Pebbling and Proofs of Work
Sort
View
WPES
2005
ACM
14 years 1 months ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
EUROCRYPT
2004
Springer
14 years 1 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
BIRTHDAY
2010
Springer
13 years 9 months ago
Inferring Loop Invariants Using Postconditions
One of the obstacles in automatic program proving is to obtain suitable loop invariants. The invariant of a loop is a weakened form of its postcondition (the loop's goal, als...
Carlo A. Furia, Bertrand Meyer
DEBU
2007
211views more  DEBU 2007»
13 years 8 months ago
Provenance in Databases: Past, Current, and Future
The need to understand and manage provenance arises in almost every scientific application. In many cases, information about provenance constitutes the proof of correctness of re...
Wang Chiew Tan