Sciweavers

5493 search results - page 75 / 1099
» Effectively Polynomial Simulations
Sort
View
JOC
2000
95views more  JOC 2000»
15 years 1 months ago
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
The goal of secure multiparty computation is to transform a given protocol involving a trusted party into a protocol without need for the trusted party, by simulating the party am...
Martin Hirt, Ueli M. Maurer
CONCUR
2010
Springer
15 years 2 months ago
Simulation Distances
Boolean notions of correctness are formalized by preorders on systems. Quantitative measures of correctness can be formalized by realvalued distance functions between systems, wher...
Pavol Cerný, Thomas A. Henzinger, Arjun Rad...
ATVA
2007
Springer
87views Hardware» more  ATVA 2007»
15 years 7 months ago
Latticed Simulation Relations and Games
Multi-valued Kripke structures are Kripke structures in which the atomic propositions and the transitions are not Boolean and can take values from some set. In particular, latticed...
Orna Kupferman, Yoad Lustig
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
WSC
2001
15 years 2 months ago
The design of a web-based training system for simulation analysis
Simulation beginners often spend a great amount of time to accumulate the knowledge as well as the experience to overcome the technical complexity of computer simulation. Limited ...
Yu-Hui Tao, Shin-Ming Guo