Sciweavers

206 search results - page 12 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
SACRYPT
2004
Springer
14 years 3 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
IMSA
2001
131views Multimedia» more  IMSA 2001»
13 years 11 months ago
SORBA: Shared Object Request Broker Architecture for Peer Computing
: In this paper, we proposed a SORBA (Shared Object Request Broker Architecture) model, an objectbased P2P model, which complies with an open architecture, and manages resources af...
U. G. Kang, H. J. Hwang, S. H. Lee, C. J. Wang
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
14 years 2 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
SIAMCOMP
2000
118views more  SIAMCOMP 2000»
13 years 9 months ago
Constructive, Deterministic Implementation of Shared Memory on Meshes
This paper describes a scheme to implement a shared address space of size m on an n-node mesh, with m polynomial in n, where each mesh node hosts a processor and a memory module. A...
Andrea Pietracaprina, Geppino Pucci, Jop F. Sibeyn
CCS
2009
ACM
14 years 4 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt