Sciweavers

195 search results - page 3 / 39
» E-voting - a Key to Independence for All
Sort
View
81
Voted
IGPL
2008
85views more  IGPL 2008»
14 years 9 months ago
Independent Bases of Admissible Rules
We show that IPC, K4, GL, and S4, as well as all logics inheriting their admissible rules, have independent bases of admissible rules. Key words: admissible rule, independent basi...
Emil Jerábek
ICICS
2004
Springer
15 years 2 months ago
A New Key-Insulated Signature Scheme
In this paper we propose a new strong and perfectly key-insulated signature scheme, more efficient than previous proposals and whose key length is constant and independent of the n...
Nicolás González-Deleito, Olivier Ma...
IDA
2009
Springer
15 years 4 months ago
Estimating Squared-Loss Mutual Information for Independent Component Analysis
Abstract. Accurately evaluating statistical independence among random variables is a key component of Independent Component Analysis (ICA). In this paper, we employ a squared-loss ...
Taiji Suzuki, Masashi Sugiyama
63
Voted
FOCS
2007
IEEE
15 years 3 months ago
Strongly History-Independent Hashing with Applications
We present a strongly history independent (SHI) hash table that supports search in O(1) worst-case time, and insert and delete in O(1) expected time using O(n) data space. This ma...
Guy E. Blelloch, Daniel Golovin
CSFW
2000
IEEE
15 years 1 months ago
Protocol Independence through Disjoint Encryption
One protocol (called the primary protocol) is independent of other protocols (jointly called the secondary protocol) if the question whether the primary protocol achieves a securi...
Joshua D. Guttman, F. Javier Thayer