Sciweavers

506 search results - page 50 / 102
» Proving Properties about Lists Using Containers
Sort
View
ASIACRYPT
2004
Springer
15 years 3 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
ADHOC
2005
102views more  ADHOC 2005»
14 years 9 months ago
Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks
In the minimum energy broadcasting problem, each node adjusts its transmission power to minimize the total energy consumption while still guaranteeing the full coverage of the net...
Julien Cartigny, François Ingelrest, David ...
SECRYPT
2007
126views Business» more  SECRYPT 2007»
14 years 11 months ago
Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs
In this paper, we study the opacity property of verifiably encrypted signatures (VES) of Boneh et al. (proposed in Eurocrypt 2003). Informally, opacity implies that although some...
Amitabh Saxena
COSIT
2009
Springer
179views GIS» more  COSIT 2009»
15 years 4 months ago
An Algebraic Approach to Image Schemas for Geographic Space
Formal models of geographic space should support reasoning about its static and dynamic properties, its objects, their behaviors, and the relationships between them. Image schemas,...
Lisa Walton, Michael F. Worboys
CSL
2000
Springer
15 years 2 months ago
Subtyping with Power Types
This paper introduces a typed λ-calculus called λPower , a predicative reformulation of part of Cardelli’s power type system. Power types integrate subtyping into the typing t...
David Aspinall