Sciweavers

6 search results - page 1 / 2
» Static Equivalence is Harder than Knowledge
Sort
View
87
Voted
ENTCS
2006
103views more  ENTCS 2006»
15 years 13 days ago
Static Equivalence is Harder than Knowledge
There are two main ways of defining secrecy of cryptographic protocols. The first version checks if the adversary can learn the value of a secret parameter. In the second version,...
Johannes Borgström
76
Voted
KI
2002
Springer
15 years 2 days ago
Acquisition of Landmark Knowledge from Static and Dynamic Presentation of Route Maps
This contribution reports on ongoing collaborative research at the University of Stanford, Department of Psychology, and the University of Hamburg, Department for Informatics. Ext...
Paul U. Lee, Heike Tappe, Alexander Klippel
109
Voted
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 29 days ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
AAAI
2000
15 years 1 months ago
A Consistency-Based Model for Belief Change: Preliminary Report
We present a general, consistency-based framework for belief change. Informally, in revising K by , we begin with and incorporate as much of K as consistently possible. Formally, ...
James P. Delgrande, Torsten Schaub
106
Voted
CP
2007
Springer
15 years 6 months ago
Tradeoffs in the Complexity of Backdoor Detection
Abstract There has been considerable interest in the identification of structural properties of combinatorial problems that lead to efficient algorithms for solving them. Some of...
Bistra N. Dilkina, Carla P. Gomes, Ashish Sabharwa...