Sciweavers

54 search results - page 1 / 11
» On Generating the Initial Key in the Bounded-Storage Model
Sort
View
EUROCRYPT
2004
Springer
13 years 10 months ago
On Generating the Initial Key in the Bounded-Storage Model
Abstract. In the bounded-storage model (BSM) for information-theoretically secure encryption and key-agreement one uses a random string R whose length t is greater than the assumed...
Stefan Dziembowski, Ueli M. Maurer
TIT
2008
187views more  TIT 2008»
13 years 4 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
HICSS
2012
IEEE
322views Biometrics» more  HICSS 2012»
12 years 11 days ago
Exploring the Motive for Data Publication in Open Data Initiative: Linking Intention to Action
This research study was designed to broaden understanding of the publishing of research datasets by distinguishing between the intention to share and the action of sharing. The da...
Djoko Sigit Sayogo, Theresa A. Pardo
COMPSAC
1998
IEEE
13 years 9 months ago
M-base: Enduser-Initiative Application Development Based on Message Flow and Componentware
Explosive increase in enduser computing on distributed systems requires that endusers develop application software by themselves. One solution is given as a formula of "a dom...
Takeshi Chusho, Mitsuyoshi Matsumoto, Yuji Konishi
ESANN
2007
13 years 6 months ago
Transition from initialization to working stage in biologically realistic networks
Natural cortical neurons form functional networks through a complex set of developmental steps. A key process in early development is the transition of the spontaneous network dyna...
Andreas Herzog, Karsten Kube, Bernd Michaelis, Ana...