Sciweavers

206 search results - page 6 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
IPL
2006
87views more  IPL 2006»
13 years 7 months ago
Strongly secure ramp secret sharing schemes for general access structures
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly...
Mitsugu Iwamoto, Hirosuke Yamamoto
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
ISCA
1998
IEEE
123views Hardware» more  ISCA 1998»
13 years 11 months ago
Weak Ordering - A New Definition
A memory model for a shared memory, multiprocessor commonly and often implicitly assumed by programmers is that of sequential consistency. This model guarantees that all memory ac...
Sarita V. Adve, Mark D. Hill
WETICE
2006
IEEE
14 years 1 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
ADAEUROPE
2009
Springer
14 years 2 months ago
Weak Fairness Semantic Drawbacks in Java Multithreading
With the development of embedded and mobile systems, Java is widely used for application programs and is also considered for implementing systems kernel or application platforms. I...
Claude Kaiser, Jean-François Pradat-Peyre