Sciweavers

234 search results - page 41 / 47
» Proof Nets and the Identity of Proofs
Sort
View
92
Voted
IPPS
1999
IEEE
15 years 2 months ago
A Consistent History Link Connectivity Protocol
The RAIN (Reliable Array of Independent Nodes) project at Caltech is focusing on creating highly reliable distributed systems by leveraging commercially available personal compute...
Paul S. LeMahieu, Jehoshua Bruck
ACNS
2004
Springer
167views Cryptology» more  ACNS 2004»
15 years 1 months ago
A Fully-Functional Group Signature Scheme over Only Known-Order Group
The concept of group signature allows a group member to sign message anonymously on behalf of the group. In the event of a dispute, a designated entity can reveal the identity of a...
Atsuko Miyaji, Kozue Umeda
ATAL
2006
Springer
15 years 1 months ago
False-name-proof combinatorial auction protocol: Groves Mechanism with SubModular Approximation
This paper develops a new combinatorial auction protocol called the Groves Mechanism with SubModular Approximation (GM-SMA). This protocol satisfies the following characteristics:...
Makoto Yokoo, Toshihiro Matsutani, Atsushi Iwasaki
116
Voted
TDM
2004
203views Database» more  TDM 2004»
14 years 11 months ago
Relational Algebra: Mother Tongue - XQuery: Fluent
This work may be seen as a further proof of the versatility of the relational database model. Here, we add XQuery to the catalog of languages which RDBMSs are able to "speak&...
Torsten Grust, Jens Teubner
CCS
2010
ACM
14 years 10 months ago
Practical leakage-resilient identity-based encryption from simple assumptions
We provide new constructions of Leakage-Resilient IdentityBased Encryption systems (IBE) in the Standard model. We apply a hash proof technique in the existing IBE schemes of Bone...
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rousela...