Sciweavers

256 search results - page 44 / 52
» Reusing Static Keys in Key Agreement Protocols
Sort
View
ASIACRYPT
2010
Springer
13 years 5 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
OOPSLA
2007
Springer
14 years 1 months ago
Combining structural subtyping and external dispatch
Nominal subtyping (or user-defined subtyping) and structural subtyping each have their own strengths and weaknesses. Nominal subtyping allows programmers to explicitly express de...
Donna Malayeri
STEP
2003
IEEE
14 years 1 months ago
On Analysis of Design Component Contracts: A Case Study
Software patterns are a new design paradigm used to solve problems that arise when developing software within a particular context. Patterns capture the static and dynamic structu...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
ER
2006
Springer
96views Database» more  ER 2006»
13 years 11 months ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu
ECOOP
2008
Springer
13 years 9 months ago
Integrating Nominal and Structural Subtyping
Nominal and structural subtyping each have their own strengths and weaknesses. Nominal subtyping allows programmers to explicitly express design intent, and, when types are associa...
Donna Malayeri, Jonathan Aldrich