Sciweavers

1350 search results - page 236 / 270
» Generalized Committed Choice
Sort
View
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
FOSSACS
2005
Springer
15 years 5 months ago
Branching Cells as Local States for Event Structures and Nets: Probabilistic Applications
We study the concept of choice for true concurrency models such as prime event structures and safe Petri nets. We propose a dynamic variation of the notion of cluster previously in...
Samy Abbes, Albert Benveniste
ICAPR
2005
Springer
15 years 5 months ago
Mathematical Features for Recognizing Preference in Sub-saharan African Traditional Rhythm Timelines
The heart of an African rhythm is the timeline, a beat that cyclically repeats thoughout a piece, and is often performed with an iron bell that all performers can hear. Such rhythm...
Godfried T. Toussaint
KIVS
2005
Springer
15 years 5 months ago
Measuring Large Overlay Networks - The Overnet Example
Peer-to-peer overlay networks have grown significantly in size and sophistication over the last years. Meanwhile, distributed hash tables (DHT) provide efficient means to create g...
Kendy Kutzner, Thomas Fuhrmann
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung