Sciweavers

330 search results - page 39 / 66
» An argumentation based approach for practical reasoning
Sort
View
EUROCRYPT
2004
Springer
15 years 5 months ago
Chosen-Ciphertext Security from Identity-Based Encryption
Abstract. We propose a simple and efficient construction of a CCAsecure public-key encryption scheme from any CPA-secure identity-based encryption (IBE) scheme. Our construction re...
Ran Canetti, Shai Halevi, Jonathan Katz
AMET
1998
Springer
15 years 4 months ago
Bidding Strategies for Trading Agents in Auction-Based Tournaments
Abstract. Auction-based electronic commerce is an increasingly interesting domain for AI researchers. In this paper we present an attempt towards the construction of trading agents...
Pere Garcia, Eduardo Giménez, Lluis Godo, J...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 3 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
14 years 12 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...
LOPSTR
2007
Springer
15 years 6 months ago
Type-Based Homeomorphic Embedding and Its Applications to Online Partial Evaluation
Homeomorphic Embedding (HEm) has proven to be very powerful for supervising termination of computations, provided that such computations are performed over a finite signature, i.e...
Elvira Albert, John P. Gallagher, Miguel Gó...