Sciweavers

1801 search results - page 163 / 361
» Pointing without a pointer
Sort
View
JUCS
2008
143views more  JUCS 2008»
14 years 10 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
ENTCS
2007
96views more  ENTCS 2007»
14 years 10 months ago
A List-machine Benchmark for Mechanized Metatheory: (Extended Abstract)
ed Metatheory (Extended Abstract) Andrew W. Appel Princeton University and INRIA Rocquencourt Xavier Leroy INRIA Rocquencourt We propose a benchmark to compare theorem-proving sys...
Andrew W. Appel, Xavier Leroy
MSS
2008
IEEE
58views Hardware» more  MSS 2008»
14 years 10 months ago
Voting with preferences over margins of victory
This paper analyzes a two-alternative voting model with the distinctive feature that voters have preferences over the support that each alternative receives, and not only over the...
Humberto Llavador
EOR
2007
84views more  EOR 2007»
14 years 10 months ago
The multi-layered network design problem
act 11 We address the problem of designing a network built on several layers. This problem occurs in practical applications 12 but has not been studied extensively from the point o...
Arnaud Knippel, Benoit Lardeux
GIS
2007
ACM
14 years 10 months ago
Contour line thinning and multigrid generation of raster-based digital elevation models
Thin plate spline interpolation is a widely used approach to generate a digital elevation model (DEM) from contour lines and scattered data. In practice, contour maps are scanned a...
Endre Katona