Sciweavers

173 search results - page 28 / 35
» Efficient One-Round Key Exchange in the Standard Model
Sort
View
ASC
2006
14 years 11 months ago
Simulation-based optimisation using local search and neural network metamodels
This paper presents a new algorithm for enhancing the efficiency of simulation-based optimisation using local search and neural network metamodels. The local search strategy is ba...
Anna Persson, Henrik Grimm, Amos Ng
CSDA
2010
94views more  CSDA 2010»
14 years 9 months ago
Implementing Bayesian predictive procedures: The K-prime and K-square distributions
The implementation of Bayesian predictive procedures under standard normal models is considered. Two distributions are of particular interest, the K-prime and Ksquare distribution...
Jacques Poitevineau, Bruno Lecoutre
CCS
2008
ACM
14 years 11 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
MSWIM
2005
ACM
15 years 3 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
JAR
2000
145views more  JAR 2000»
14 years 9 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro