Sciweavers

15792 search results - page 2937 / 3159
» Computational Abstraction Steps
Sort
View
105
Voted
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
DCOSS
2008
Springer
15 years 2 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
122
Voted
ECOOPW
2008
Springer
15 years 2 months ago
Equation-Based Object-Oriented Languages and Tools
EOOLT'2007 was the first edition of the ECOOP-EOOLT workshop. The workshop is intended to bring researchers associated with different equation-based object-oriented (EOO) mode...
Peter Fritzson, David Broman, François Cell...
EUROCRYPT
2008
Springer
15 years 2 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup
90
Voted
BILDMED
2007
112views Algorithms» more  BILDMED 2007»
15 years 2 months ago
Fully-Automatic Correction of the Erroneous Border Areas of an Aneurysm
Abstract. Volume representations of blood vessels acquired by 3D rotational angiography are very suitable for diagnosing an aneurysm. We presented a fully-automatic aneurysm labell...
Jan Bruijns, Frans J. Peters, Robert-Paul Berretty...
« Prev « First page 2937 / 3159 Last » Next »