Sciweavers

100 search results - page 14 / 20
» Universal Designated-Verifier Signatures
Sort
View
CCS
2005
ACM
15 years 3 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
FROCOS
2005
Springer
15 years 3 months ago
Connecting Many-Sorted Structures and Theories Through Adjoint Functions
In a previous paper, we have introduced a general approach for connecting two many-sorted theories through connection functions that behave like homomorphisms on the shared signatu...
Franz Baader, Silvio Ghilardi
KR
2010
Springer
15 years 2 months ago
Query and Predicate Emptiness in Description Logics
Ontologies can be used to provide an enriched vocabulary for the formulation of queries over instance data. We identify query emptiness and predicate emptiness as two central reas...
Franz Baader, Meghyn Bienvenu, Carsten Lutz, Frank...
ESORICS
2010
Springer
14 years 11 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
JCB
2006
97views more  JCB 2006»
14 years 9 months ago
Wavelet Analysis of DNA Walks
A wavelet transform of the DNA "walk" constructed from a genomic sequence offers a direct visualization of short and long-range patterns in nucleotide sequences. We stud...
Adrian D. Haimovich, Bruce Byrne, Ramakrishna Rama...