Sciweavers

1195 search results - page 32 / 239
» New constructions of SSPDs and their applications
Sort
View
CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
15 years 3 months ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
ISSTA
2012
ACM
13 years 2 months ago
Finding errors in multithreaded GUI applications
To keep a Graphical User Interface (GUI) responsive and active, a GUI application often has a main UI thread (or event dispatching thread) and spawns separate threads to handle le...
Sai Zhang, Hao Lü, Michael D. Ernst
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
15 years 8 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
COMPGEOM
2005
ACM
15 years 1 months ago
The Visibility-Voronoi Complex and Its Applications
We introduce a new type of diagram called the VV(c)-diagram (the visibility–Voronoi diagram for clearance c), which is a hybrid between the visibility graph and the Voronoi diag...
Ron Wein, Jur P. van den Berg, Dan Halperin
ECIS
2000
15 years 1 months ago
Intra-Censal Geographical Information Systems: Application to Binational Border Cities
This paper presents a new design for a census-based binational geographic information system. GIS has had limited application intra-censally i.e. between nations. The reasons are t...
James B. Pick, W. James Hettrick, Nanda K. Viswana...