Sciweavers

3101 search results - page 7 / 621
» Composing Adaptive Software
Sort
View
ICALP
2007
Springer
15 years 1 months ago
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge
Adaptive security, while more realistic as an adversarial model, is typically much harder to achieve compared to static security in cryptographic protocol design. Universal composi...
Aggelos Kiayias, Hong-Sheng Zhou
AH
2000
Springer
15 years 3 months ago
Coherence in Modularly Composed Adaptive Learning Documents
Abstract. In this paper we suggest the Multibook approach how the gap between adaptivity and readability can be diminished. We show how a knowledge base has to be described by meta...
Cornelia Seeberg, Achim Steinacker, Ralf Steinmetz
ASIACRYPT
2008
Springer
15 years 1 months ago
Universally Composable Adaptive Oblivious Transfer
In an oblivious transfer (OT) protocol, a Sender with messages M1, . . . , MN and a Receiver with indices 1, . . . , k [1, N] interact in such a way that at the end the Receiver ...
Matthew Green, Susan Hohenberger
FOCS
2010
IEEE
14 years 9 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
USITS
2001
15 years 27 days ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...