Sciweavers

2576 search results - page 139 / 516
» The Complexity of Zero Knowledge
Sort
View
IACR
2011
97views more  IACR 2011»
14 years 4 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
IACR
2011
105views more  IACR 2011»
14 years 4 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
AH
2008
Springer
15 years 11 months ago
Automatic Generation of User Adapted Learning Designs: An AI-Planning Proposal
Abstract. A Learning Design(LD) definition under the IMS-LD standard is a complex task for the instructor because it requires a lot of time, effort and previous knowledge of the ...
Lluvia Morales, Luis A. Castillo, Juan Ferná...
DEXAW
2006
IEEE
156views Database» more  DEXAW 2006»
15 years 11 months ago
Social Enterprise Architecture: Towards an Extendable and Scaleable System Architecture for KM
Internet should be used to reduce distances and bring people virtually closer. Using ICT, many people has overcome the problem of digital divided [1] thanks to support of informat...
Flavio Corradini, Alberto Polzonetti, Romeo Pruno,...
DLOG
2007
15 years 7 months ago
Partitioning ABoxes Based on Converting DL to Plain Datalog
Abstract. To make ABox reasoning scalable for large ABoxes in description logic (DL) knowledge bases, we develop a method for partitioning the ABox so that specific kinds of reaso...
Jianfeng Du, Yi-Dong Shen