Sciweavers

1763 search results - page 76 / 353
» A Formalization of Polytime Functions
Sort
View
CSFW
2011
IEEE
13 years 9 months ago
Security for Key Management Interfaces
—We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicabl...
Steve Kremer, Graham Steel, Bogdan Warinschi
ICDCSW
2011
IEEE
13 years 9 months ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
ASIACRYPT
2008
Springer
14 years 12 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh
CIKM
2011
Springer
13 years 9 months ago
Lower-bounding term frequency normalization
In this paper, we reveal a common deficiency of the current retrieval models: the component of term frequency (TF) normalization by document length is not lower-bounded properly;...
Yuanhua Lv, ChengXiang Zhai
IFL
1998
Springer
139views Formal Methods» more  IFL 1998»
15 years 2 months ago
Higher Order Demand Propagation
Abstract. In this report a new backward strictness analysis for functional languages is presented. It is called higher order demand propagation and is applicable to a realistic non...
Dirk Pape