Sciweavers

298 search results - page 52 / 60
» Strong Anonymous Signatures
Sort
View
ESOP
2005
Springer
14 years 27 days ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
ATAL
2008
Springer
13 years 9 months ago
Undominated VCG redistribution mechanisms
Many important problems in multiagent systems can be seen as resource allocation problems. For such problems, the well-known Vickrey-Clarke-Groves (VCG) mechanism is efficient, in...
Mingyu Guo, Vincent Conitzer
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
13 years 11 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
MOBICOM
2010
ACM
13 years 7 months ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
BMCBI
2010
125views more  BMCBI 2010»
13 years 7 months ago
Haplotype allelic classes for detecting ongoing positive selection
Background: Natural selection eliminates detrimental and favors advantageous phenotypes. This process leaves characteristic signatures in underlying genomic segments that can be r...
Julie Hussin, Philippe Nadeau, Jean-Françoi...