Sciweavers

206 search results - page 12 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
78
Voted
SACRYPT
2004
Springer
15 years 5 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
IMSA
2001
131views Multimedia» more  IMSA 2001»
15 years 1 months ago
SORBA: Shared Object Request Broker Architecture for Peer Computing
: In this paper, we proposed a SORBA (Shared Object Request Broker Architecture) model, an objectbased P2P model, which complies with an open architecture, and manages resources af...
U. G. Kang, H. J. Hwang, S. H. Lee, C. J. Wang
121
Voted
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
15 years 4 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
SIAMCOMP
2000
118views more  SIAMCOMP 2000»
15 years 7 days ago
Constructive, Deterministic Implementation of Shared Memory on Meshes
This paper describes a scheme to implement a shared address space of size m on an n-node mesh, with m polynomial in n, where each mesh node hosts a processor and a memory module. A...
Andrea Pietracaprina, Geppino Pucci, Jop F. Sibeyn
85
Voted
CCS
2009
ACM
15 years 7 months ago
A metadata calculus for secure information sharing
In both commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information to the concerned actors. Traditional approaches to informa...
Mudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt