Sciweavers

104 search results - page 14 / 21
» A Canonical Scheme for Model Composition
Sort
View
119
Voted
CSL
2010
Springer
15 years 3 months ago
From Feasible Proofs to Feasible Computations
We shall discuss several situations in which it is possible to extract from a proof, be it a proof in a first-order theory or a propositional proof, some feasible computational inf...
Jan Krajícek
EUROCRYPT
1999
Springer
15 years 6 months ago
A Note on the Limits of Collusion-Resistant Watermarks
In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1 , D2 , . . . to each buyer; if a buyer posts his/her document Di to the...
Funda Ergün, Joe Kilian, Ravi Kumar
97
Voted
WCE
2007
15 years 3 months ago
Simulation of Transformer With Aging Insulation and Incipient Faults
Abstract—The development of the transformer insulation failure undergoes three stages: insulation aging, incipient faults and a short circuit. This paper presents a complete sche...
X. Wang, Mark Sumner, D. W. P. Thomas
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 7 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
107
Voted
ESORICS
2006
Springer
15 years 5 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea