Sciweavers

1916 search results - page 192 / 384
» Reasoning with class algebra
Sort
View
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
SIGMOD
1995
ACM
116views Database» more  SIGMOD 1995»
15 years 7 months ago
Incremental Maintenance of Views with Duplicates
We study the problem of e cient maintenance of materialized views that may contain duplicates. This problem is particularly important when queries against such views involve aggre...
Timothy Griffin, Leonid Libkin
COMPSEC
2002
92views more  COMPSEC 2002»
15 years 4 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
LPNMR
2007
Springer
15 years 10 months ago
An Smodels System with Limited Lookahead Computation
We describe an answer-set programming solver smodels− , derived from smodels by eliminating some lookahead computations. We show that for some classes of programs smodels− outp...
Gayathri Namasivayam, Miroslaw Truszczynski
CSL
2004
Springer
15 years 9 months ago
Automated Generation of Analytic Calculi for Logics with Linearity
Abstract. We show how to automatically generate analytic hypersequent calculi for a large class of logics containing the linearity axiom (lin) (A ⊃ B) ∨ (B ⊃ A) starting from...
Agata Ciabattoni