Sciweavers

220 search results - page 2 / 44
» ideal 2005
Sort
View
CRYPTO
2008
Springer
120views Cryptology» more  CRYPTO 2008»
13 years 11 months ago
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
The Random Oracle Model and the Ideal Cipher Model are two well known idealised models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al. showed...
Jean-Sébastien Coron, Jacques Patarin, Yann...
GROUP
2005
ACM
14 years 3 months ago
What ideal end users teach us about collaborative software
Many studies have evaluated different uses of collaborative software. Typically, the research has focused on the shortcomings and, sometimes, the ways end users succeed or fail to...
David F. Redmiles, Hiroko Wilensky, Kristie Kosaka...
DSVIS
2005
Springer
14 years 3 months ago
Solving the Mapping Problem in User Interface Design by Seamless Integration in IdealXML
The mapping problem has been defined as the way to map models involved throughout the development life cycle of user interfaces. Model-based design of user interfaces has followed ...
Francisco Montero, Víctor López-Jaqu...
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 3 months ago
Characterizing Ideal Weighted Threshold Secret Sharing
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user is assigned a positive w...
Amos Beimel, Tamir Tassa, Enav Weinreb
CANDC
2005
ACM
13 years 9 months ago
A family of metrics for biopolymers based on counting independent sets
We introduce a new family of metrics for graphs of fixed size, based on counting-independent sets. Our definition is simpler and easier to e than the edge ideal metric family defi...
Jairo Rocha, Mercè Llabrés, Ricardo ...