In this paper, we study the opacity property of verifiably encrypted signatures (VES) of Boneh et al. (proposed in Eurocrypt 2003). Informally, opacity implies that although some...
With the advent of the new wireless technologies allowing for higher data rates, the provision of high quality multimedia services over the upcoming wireless and mobile networks i...
: In this paper, we document our efforts in participating to the TREC 2007 Legal track. We had multiple aims: First, to experiment with using different query formulations, trying t...
Avi Arampatzis, Jaap Kamps, Martijn Kooken, Nir Nu...
We study the extension (introduced as BT in [5]) of the theory S1 2 by instances of the dual (onto) weak pigeonhole principle for p-time functions, dWPHP(PV )x x2 . We propose a n...
The Internet is witnessing explosive growth in traffic due to bulk content transfers, such as multimedia and software downloads, and online sharing of personal, commercial, and sc...
Massimiliano Marcon, Nuno Santos, P. Krishna Gumma...