Sciweavers

172 search results - page 3 / 35
» Key agreement from weak bit agreement
Sort
View
IJNSEC
2006
78views more  IJNSEC 2006»
14 years 9 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
ALGORITHMICA
2008
52views more  ALGORITHMICA 2008»
14 years 9 months ago
From Constrained to Unconstrained Maximum Agreement Subtree in Linear Time
We propose and study the Maximum Constrained Agreement Subtree (MCAST) problem, which is a variant of the classical Maximum Agreement Subtree (MAST) problem. Our problem allows us...
V. Berry, Z. S. Peng, H. F. Ting
FSS
2010
102views more  FSS 2010»
14 years 7 months ago
Measuring conflict and agreement between two prioritized knowledge bases in possibilistic logic
In this paper we investigate the relationship between two prioritized knowledge bases by measuring both the conflict and the agreement between them. First of all, a quantity of co...
Guilin Qi, Weiru Liu, David A. Bell
NTMS
2009
IEEE
15 years 4 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
15 years 10 months ago
The complexity of agreement
A celebrated 1976 theorem of Aumann asserts that honest, rational Bayesian agents with common priors will never "agree to disagree": if their opinions about any topic ar...
Scott Aaronson