Sciweavers

488 search results - page 30 / 98
» Policy-Based Cryptography and Applications
Sort
View
CCS
2000
ACM
13 years 11 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 3 months ago
Subspace LWE
The (decisional) learning with errors problem (LWE) asks to distinguish “noisy” inner products of a secret vector with random vectors from uniform. In recent years, the LWE pro...
Krzysztof Pietrzak
MPC
2010
Springer
157views Mathematics» more  MPC 2010»
14 years 5 days ago
The Logic of Large Enough
Abstract. In this paper we explore the “for large enough” quantifier, also known as “all but finitely many”, which plays a central role in asymptotic reasoning, as used f...
Eerke A. Boiten, Dan Grundy
CORR
2010
Springer
368views Education» more  CORR 2010»
13 years 7 months ago
Quasigroups in cryptology
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60. Key words and phrases: Crypto...
V. A. Shcherbacov
FFA
2006
77views more  FFA 2006»
13 years 7 months ago
Linear error-block codes
A linear error-block code is a natural generalization of the classical error-correcting code and has applications in experimental design, high-dimensional numerical integration an...
Keqin Feng, Lanju Xu, Fred J. Hickernell