Sciweavers

AES
2010
Springer
120views Cryptology» more  AES 2010»
13 years 8 months ago
The quadratic MITC plate and MITC shell elements in plate bending
Phill-Seung Lee, Klaus-Jürgen Bathe
AES
2010
Springer
129views Cryptology» more  AES 2010»
13 years 8 months ago
Block aggregation of stress constraints in topology optimization of structures
J. París, F. Navarrina, I. Colominas, M. Ca...
AES
2010
Springer
141views Cryptology» more  AES 2010»
13 years 8 months ago
Provide Virtual Distributed Environments for Grid computing on demand
Grid users always expect to meet some challenges to employ Grid resources, such as customized computing environment and QoS support. In this paper, we propose a new methodology fo...
Lizhe Wang, Gregor von Laszewski, Marcel Kunze, Ji...
FC
2010
Springer
176views Cryptology» more  FC 2010»
13 years 8 months ago
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
J. Melia-Segui, Joaquín García-Alfar...
FC
2010
Springer
158views Cryptology» more  FC 2010»
13 years 8 months ago
A Secure and Privacy-Preserving Targeted Ad-System
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods vio...
Elli Androulaki, Steven M. Bellovin
FC
2010
Springer
164views Cryptology» more  FC 2010»
13 years 8 months ago
Practical Private Set Intersection Protocols with Linear Complexity
Emiliano De Cristofaro, Gene Tsudik
EUROCRYPT
2010
Springer
13 years 8 months ago
On the Impossibility of Three-Move Blind Signature Schemes
We investigate the possibility to prove security of the well-known blind signature schemes by Chaum, and by Pointcheval and Stern in the standard model, i.e., without random oracle...
Marc Fischlin, Dominique Schröder
CRYPTO
2010
Springer
145views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Protocols for Multiparty Coin Toss with Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution. These protocols are used as a building block in many cryptographic protocols. Cleve [STOC...
Amos Beimel, Eran Omri, Ilan Orlov
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti