Sciweavers

849 search results - page 42 / 170
» Completely Non-malleable Schemes
Sort
View
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
15 years 3 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz
LOGCOM
1998
122views more  LOGCOM 1998»
14 years 9 months ago
Adding the Everywhere Operator to Propositional Logic
Sound and complete modal propositional logic C is presented, in which 2P has the interpretation “ P is true in all states”. The interpretation is already known as the Carnapia...
David Gries, Fred B. Schneider
TELSYS
2002
120views more  TELSYS 2002»
14 years 9 months ago
A Receiver-Driven Transport Protocol for the Web
Abstract. In this paper, we present a receiver-oriented, request/response protocol for the Web that is compatible with the dynamics of TCP's congestion control algorithm. The ...
Rajarshi Gupta, Mike Y. Chen, Steven McCanne, Jean...
ETS
2009
IEEE
128views Hardware» more  ETS 2009»
14 years 7 months ago
Algorithms for ADC Multi-site Test with Digital Input Stimulus
This paper reports two novel algorithms based on time-modulo reconstruction method intended for detection of the parametric faults in analogue-to-digital converters (ADC). In both ...
Xiaoqin Sheng, Hans G. Kerkhoff, Amir Zjajo, Guido...
ICIP
2009
IEEE
14 years 7 months ago
Text segmentation in natural scenes using Toggle-Mapping
We offer, in this paper, a new method to segment text in natural scenes. This method is based on the use of a morphological operator: the Toggle Mapping. The efficiency of the met...
Jonathan Fabrizio, Beatriz Marcotegui, Matthieu Co...