Sciweavers

62 search results - page 8 / 13
» Groth-Sahai Proofs Revisited
Sort
View
ESWS
2006
Springer
15 years 2 months ago
Ontology Engineering Revisited: An Iterative Case Study
Existing mature ontology engineering approaches are based on some basic assumptions that are often violated in practice, in particular in the Semantic Web. Ontologies often need to...
Christoph Tempich, Helena Sofia Pinto, Steffen Sta...
88
Voted
ASIACRYPT
2009
Springer
15 years 5 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
99
Voted
BIRTHDAY
2007
Springer
15 years 5 months ago
The Hydra Battle Revisited
Showing termination of the Battle of Hercules and Hydra is a challenge. We present the battle both as a rewrite system and as an arithmetic while program, provide proofs of their t...
Nachum Dershowitz, Georg Moser
92
Voted
CSL
2007
Springer
15 years 5 months ago
Qualitative Temporal and Spatial Reasoning Revisited
Abstract. Establishing local consistency is one of the main algorithmic techniques in temporal and spatial reasoning. In this area, one of the central questions for the various pro...
Manuel Bodirsky, Hubie Chen
84
Voted
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
15 years 4 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...