Sciweavers

10575 search results - page 1790 / 2115
» T2Script Programming Language
Sort
View
ICALP
2005
Springer
15 years 10 months ago
Simple Extractors via Constructions of Cryptographic Pseudo-random Generators
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-r...
Marius Zimand
IFIP
2005
Springer
15 years 10 months ago
Opacity Generalised to Transition Systems
Recently, opacity has proved to be a promising technique for describing security properties. Much of the work has been couched in terms of Petri nets. Here, we extend the notion of...
Jeremy Bryans, Maciej Koutny, Laurent Mazaré...
IFIP
2005
Springer
15 years 10 months ago
On Anonymity with Identity Escrow
Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exception...
Aybek Mukhamedov, Mark Dermot Ryan
IFIP
2005
Springer
15 years 10 months ago
Voting Technologies and Trust
In this paper, as a step towards the ultimate aim of developing an evoting system that would be likely to gain and retain the trust of the general voting public, we describe a des...
Brian Randell, Peter Y. A. Ryan
IFIP
2005
Springer
15 years 10 months ago
Numerical Approximation of a Control Problem for Advection-Diffusion Processes
Two different approaches are proposed to enhance the efficiency of the numerical resolution of optimal control problems governed by a linear advection– diffusion equation. In ...
Alfio Quarteroni, Gianluigi Rozza, L. Dedè,...
« Prev « First page 1790 / 2115 Last » Next »