Sciweavers

234 search results - page 17 / 47
» Proof Nets and the Identity of Proofs
Sort
View
COMBINATORICS
2007
83views more  COMBINATORICS 2007»
14 years 10 months ago
Explicit Enumeration of Triangulations with Multiple Boundaries
We enumerate rooted triangulations of a sphere with multiple holes by the total number of edges and the length of each boundary component. The proof relies on a combinatorial iden...
Maxim Krikun
PLDI
2010
ACM
15 years 7 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
86
Voted
DAM
1998
61views more  DAM 1998»
14 years 9 months ago
On Trees and Noncrossing Partitions
We give a simple and natural proof of (an extension of) the identity P(k, l, n) = P2(k − 1, l − 1, n − 1). The number P(k, l, n) counts noncrossing partitions of {1, 2, . . ...
Martin Klazar
EUC
2008
Springer
14 years 12 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 3 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng