Sciweavers

2137 search results - page 316 / 428
» Proving Abstract Non-interference
Sort
View
132
Voted
ICANN
2005
Springer
15 years 8 months ago
Varying the Population Size of Artificial Foraging Swarms on Time Varying Landscapes
Abstract. Swarm Intelligence (SI) is the property of a system whereby the collective behaviors of (unsophisticated) entities interacting locally with their environment cause cohere...
Carlos Fernandes, Vitorino Ramos, Agostinho C. Ros...
IFIP
2005
Springer
15 years 8 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
125
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 8 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
119
Voted
IMA
2005
Springer
71views Cryptology» more  IMA 2005»
15 years 8 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
121
Voted
MFCS
2005
Springer
15 years 8 months ago
Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix
Abstract. Given a distance matrix M that specifies the pairwise evolutionary distances between n species, the phylogenetic tree reconstruction problem asks for an edge-weighted ph...
Ho-Leung Chan, Jesper Jansson, Tak Wah Lam, Siu-Mi...