Sciweavers

1323 search results - page 161 / 265
» Updatable Security Views
Sort
View
127
Voted
PKC
2004
Springer
146views Cryptology» more  PKC 2004»
15 years 7 months ago
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
Abstract. In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construc...
Huafei Zhu
130
Voted
BDIM
2008
IEEE
141views Business» more  BDIM 2008»
15 years 4 months ago
IT confidentiality risk assessment for an architecture-based approach
Information systems require awareness of risks and a good understanding of vulnerabilities and their exploitations. In this paper, we propose a novel approach for the systematic as...
Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul...
POPL
2009
ACM
16 years 3 months ago
Bidirectionalization for free! (Pearl)
A bidirectional transformation consists of a function get that takes a source (document or value) to a view and a function put that takes an updated view and the original source b...
Janis Voigtländer
MINENET
2005
ACM
15 years 8 months ago
Identifying BGP routing table transfers
BGP routing updates collected by monitoring projects such as RouteViews and RIPE have been a vital source to our understanding of the global routing system. The updates logged by ...
Beichuan Zhang, Vamsi Kambhampati, Mohit Lad, Dani...
ICFP
2010
ACM
15 years 3 months ago
Bidirectionalizing graph transformations
Bidirectional transformations provide a novel mechanism for synchronizing and maintaining the consistency of information between input and output. Despite many promising results o...
Soichiro Hidaka, Zhenjiang Hu, Kazuhiro Inaba, Hir...