Sciweavers

2154 search results - page 223 / 431
» On the notion of concept I
Sort
View
ASIACRYPT
2006
Springer
15 years 5 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
CAISE
2006
Springer
15 years 5 months ago
Towards a Common Ontology for Business Models
To create an understanding of enterprises and the ways they do business, a starting point could be to identify the main actors and the values transferred between them. Business mod...
Birger Andersson, Maria Bergholtz, Ananda Edirisur...
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 5 months ago
Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast
Most voting schemes rely on a number of authorities. If too many of these authorities are dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy...
Jens Groth
DALT
2006
Springer
15 years 5 months ago
A Functional Program for Agents, Actions, and Deontic Specifications
We outline elements of the Abstract Contract Calculator, a prototype language implemented in Haskell (a declarative programming language) in which we simulate agents executing abst...
Adam Zachary Wyner
COMPSAC
2001
IEEE
15 years 5 months ago
Designing Role Hierarchies for Access Control in Workflow Systems
he correspondence between the role abstraction in Role-based Access Control (RBAC) and the notion of organizational positions, it seems easy to construct role hierarchies. This is...
Reinhardt A. Botha, Jan H. P. Eloff