Sciweavers

700 search results - page 27 / 140
» et 2008
Sort
View
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 7 months ago
Cryptanalysis of the RSA-CEGD protocol
Recently, Nenadi
Juan M. Estévez-Tapiador, Almudena Alcaide,...
IJCPOL
2008
55views more  IJCPOL 2008»
13 years 7 months ago
Event Selection and Coercion of Two Verbs of Ingestion: a Marvs Perspective
Event semantics in general and event type coercion in particular have been a challenging yet rewarding topic in verbal semantics (Pustejovsky, 1995). However, there have been few ...
Jia-Fei Hong, Chu-Ren Huang, Kathleen Ahrens
APPROX
2010
Springer
138views Algorithms» more  APPROX 2010»
13 years 9 months ago
Improved Rounding for Parallel Repeated Unique Games
We show a tight relation between the behavior of unique games under parallel repetition and their semidefinite value. Let G be a unique game with alphabet size k. Suppose the semid...
David Steurer
CCS
2009
ACM
14 years 2 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
JUCS
2008
143views more  JUCS 2008»
13 years 7 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow