Sciweavers

20175 search results - page 119 / 4035
» Is abstraction the key to computing
Sort
View
130
Voted
MASA
2001
Springer
15 years 5 months ago
Intelligent Agents: The Key Concepts
This chapter aims to introduce the reader to the basic issues surrounding the design and implementation of intelligent agents. It begins by motivating the idea of an agent, present...
Michael Wooldridge
108
Voted
EUROCRYPT
2006
Springer
15 years 4 months ago
A Provable-Security Treatment of the Key-Wrap Problem
Abstract. We give a provable-security treatment for the key-wrap problem, providing definitions, constructions, and proofs. We suggest that key-wrap's goal is security in the ...
Phillip Rogaway, Thomas Shrimpton
ASIACRYPT
2009
Springer
15 years 4 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
ICDCS
1998
IEEE
15 years 5 months ago
CLIQUES: A New Approach to Group Key Agreement
This paper considers the problem of key agreement in a group setting with highly-dynamic group member population. A protocol suite, called CLIQUES, is developed by extending the w...
Michael Steiner, Gene Tsudik, Michael Waidner