Sciweavers

2000 search results - page 283 / 400
» Program Transformation and Proof Transformation
Sort
View
129
Voted
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...
110
Voted
TLCA
2005
Springer
15 years 9 months ago
The Elimination of Nesting in SPCF
We use a fully abstract denotational model to show that nested function calls and recursive definitions can be eliminated from SPCF (a typed functional language with simple non-lo...
James Laird
141
Voted
RTA
2004
Springer
15 years 9 months ago
mu-term: A Tool for Proving Termination of Context-Sensitive Rewriting
Restrictions of rewriting can eventually achieve termination by pruning all infinite rewrite sequences issued from every term. Contextsensitive rewriting (CSR) is an example of su...
Salvador Lucas
151
Voted
SWAT
2004
Springer
171views Algorithms» more  SWAT 2004»
15 years 9 months ago
Connectivity of Graphs Under Edge Flips
We study the following problem: Given a set V of n vertices and a set E of m edge pairs, we define a graph family G(V, E) as the set of graphs that have vertex set V and contain ...
Norbert Zeh
137
Voted
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung