We consider the task of computing power productsQ 1ik gei i ("multi-exponentiation") where base elements g2, . . ., gk are fixed while g1 is variable between multi-expone...
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
A new identity-based key agreement protocol designed to operate on thenetworklayerispresented. Endpoint addresses, namelyIP and MAC addresses, areusedaspublickeystoauthenticatethe ...
Christian Schridde, Matthew Smith, Bernd Freislebe...
In this work we study linear secret sharing schemes for s-t connectivity in directed graphs. In such schemes the parties are edges of a complete directed graph, and a set of partie...
This paper examines two seemingly unrelated qualitative spatial reasoning domains; geometric proportional analogies and topographic (landcover) maps. We present a Structure Matchin...
Diarmuid P. O'Donoghue, Amy J. Bohan, Mark T. Kean...
Abstract This paper presents an application that automatically generates basic stories: short texts that only narrate the main events of the plot. The system operates with a repres...
The work of Boden on the nature of creativity has been extremely influential, particularly the hypothesis that the highest form of creativity results from transformation of a conce...
Analogy is a powerful boundary-transcending process that exploits a conceptual system's ability to perform controlled generalization in one domain and re-specialization into ...