Sciweavers

631 search results - page 4 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
SIAMSC
2008
126views more  SIAMSC 2008»
13 years 7 months ago
Highly Efficient Strong Stability-Preserving Runge-Kutta Methods with Low-Storage Implementations
Strong stability-preserving (SSP) Runge
David I. Ketcheson
CCS
2008
ACM
13 years 9 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
SIAMDM
2010
128views more  SIAMDM 2010»
13 years 5 months ago
t-Perfection Is Always Strong for Claw-Free Graphs
A connected graph G is called t-perfect if its stable set polytope is determined by the non-negativity, edge and odd-cycle inequalities. Moreover, G is called strongly t-perfect i...
Henning Bruhn, Maya Stein
TYPES
2007
Springer
14 years 1 months ago
Characterising Strongly Normalising Intuitionistic Sequent Terms
This paper gives a characterisation, via intersection types, of the strongly normalising terms of an intuitionistic sequent calculus (where LJ easily embeds). The soundness of the ...
José Espírito Santo, Silvia Ghilezan...
PVLDB
2010
179views more  PVLDB 2010»
13 years 6 months ago
Nearest Neighbor Search with Strong Location Privacy
The tremendous growth of the Internet has significantly reduced the cost of obtaining and sharing information about individuals, raising many concerns about user privacy. Spatial...
Stavros Papadopoulos, Spiridon Bakiras, Dimitris P...