Sciweavers

1449 search results - page 194 / 290
» Secure and Efficient Metering
Sort
View
CCS
2008
ACM
15 years 6 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
EUROCRYPT
2009
Springer
16 years 5 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
16 years 4 months ago
Non-interactive and reusable non-malleable commitment schemes
We consider non-malleable (NM) and universally composable (UC) commitment schemes in the common reference string (CRS) model. We show how to construct non-interactive NM commitmen...
Ivan Damgård, Jens Groth
BTW
2005
Springer
80views Database» more  BTW 2005»
15 years 10 months ago
Measuring the Quality of Approximated Clusterings
Abstract. Clustering has become an increasingly important task in modern application domains. In many areas, e.g. when clustering complex objects, in distributed clustering, or whe...
Hans-Peter Kriegel, Martin Pfeifle
IEAAIE
2004
Springer
15 years 9 months ago
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach
This paper investigates the suitability of linear genetic programming (LGP) technique to model efficient intrusion detection systems, while comparing its performance with artificia...
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham