Sciweavers

20126 search results - page 3780 / 4026
» Timed Transition Systems
Sort
View
SPAA
2010
ACM
15 years 8 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
158
Voted
EUROCRYPT
2010
Springer
15 years 8 months ago
Algebraic Cryptanalysis of McEliece Variants with Compact Keys
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryposystem relies on the use of error-correcting codes. Since...
Jean-Charles Faugère, Ayoub Otmani, Ludovic...
EUROCRYPT
2010
Springer
15 years 8 months ago
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively corrupt a subset of the...
Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck W...
EUROGP
2009
Springer
105views Optimization» more  EUROGP 2009»
15 years 8 months ago
Quantum Circuit Synthesis with Adaptive Parameters Control
The contribution presented herein proposes an adaptive genetic algorithm applied to quantum logic circuit synthesis that, dynamically adjusts its control parameters. The adaptation...
Cristian Ruican, Mihai Udrescu, Lucian Prodan, Mir...
GI
2009
Springer
15 years 8 months ago
Discovery of Smart Objects in Ubiquitous Environments and the Need for Interaction Metaphors
: In ubiquitous environments computers and smart devices, especially the technical view on them, disappear and users are supported to concentrate on the tasks they actually intend ...
René Reiners
« Prev « First page 3780 / 4026 Last » Next »