Sciweavers

488 search results - page 30 / 98
» Policy-Based Cryptography and Applications
Sort
View
CCS
2000
ACM
15 years 5 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 8 months ago
Subspace LWE
The (decisional) learning with errors problem (LWE) asks to distinguish “noisy” inner products of a secret vector with random vectors from uniform. In recent years, the LWE pro...
Krzysztof Pietrzak
93
Voted
MPC
2010
Springer
157views Mathematics» more  MPC 2010»
15 years 5 months ago
The Logic of Large Enough
Abstract. In this paper we explore the “for large enough” quantifier, also known as “all but finitely many”, which plays a central role in asymptotic reasoning, as used f...
Eerke A. Boiten, Dan Grundy
294
Voted
CORR
2010
Springer
368views Education» more  CORR 2010»
15 years 23 days ago
Quasigroups in cryptology
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60. Key words and phrases: Crypto...
V. A. Shcherbacov
95
Voted
FFA
2006
77views more  FFA 2006»
15 years 20 days ago
Linear error-block codes
A linear error-block code is a natural generalization of the classical error-correcting code and has applications in experimental design, high-dimensional numerical integration an...
Keqin Feng, Lanju Xu, Fred J. Hickernell