Sciweavers

165 search results - page 18 / 33
» Cryptographic Complexity Classes and Computational Intractab...
Sort
View
ATAL
1997
Springer
15 years 5 months ago
Multi-Agent Coordination through Coalition Formation
Incorporating coalition formation algorithms into agent systems shall be advantageous due to the consequent increase in the overall quality of task performance. Coalition formatio...
Onn Shehory, Katia P. Sycara, Somesh Jha
CORR
1999
Springer
65views Education» more  CORR 1999»
15 years 1 months ago
Unambiguous Computation: Boolean Hierarchies and Sparse Turing-Complete Sets
It is known that for any class C closed under union and intersection, the Boolean closure of C, the Boolean hierarchy over C, and the symmetric difference hierarchy over C all are ...
Lane A. Hemaspaandra, Jörg Rothe
ICSE
2008
IEEE-ACM
16 years 1 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
CRYPTO
2011
Springer
232views Cryptology» more  CRYPTO 2011»
14 years 1 months ago
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Structure-preserving signatures are signatures defined over bilinear groups that rely on generic group operations. In particular, the messages and signatures consist of group elem...
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, M...
CCS
2007
ACM
15 years 5 months ago
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC) policies may be changed by each administrator. It is often difficult to fully understand the effe...
Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, M...