Sciweavers

7961 search results - page 1207 / 1593
» Input-Output Model Programs
Sort
View
122
Voted
ICALP
2005
Springer
15 years 10 months ago
Computationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of a passive adversary. In contrast to other works, we do not conside...
Mathieu Baudet, Véronique Cortier, Steve Kr...
132
Voted
ICALP
2005
Springer
15 years 10 months ago
Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity
We develop a new method for estimating the discrepancy of tensors associated with multiparty communication problems in the “Number on the Forehead” model of Chandra, Furst and...
Jeff Ford, Anna Gál
126
Voted
ICALP
2005
Springer
15 years 10 months ago
Quantum Complexity of Testing Group Commutativity
We consider the problem of testing the commutativity of a black-box group specified by its k generators. The complexity (in terms of k) of this problem was first considered by Pa...
Frédéric Magniez, Ashwin Nayak
ICALP
2005
Springer
15 years 10 months ago
Hierarchical Group Signatures
We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the si...
Mårten Trolin, Douglas Wikström
ICAPR
2005
Springer
15 years 10 months ago
Designing a Fast Convolution Under the LIP Paradigm Applied to Edge Detection
The Logarithmic Image Processing model (LIP) is a robust mathematical framework for the processing of transmitted and reflected images. It follows many visual, physical and psycho...
José M. Palomares, Jesús Gonzá...
« Prev « First page 1207 / 1593 Last » Next »