Sciweavers

679 search results - page 102 / 136
» Using decision problems in public key cryptography
Sort
View
CCS
2001
ACM
15 years 5 months ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 5 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ENC
2005
IEEE
15 years 7 months ago
Inferring acceptable arguments with Answer Set Programming
Following the argumentation framework and semantics proposed by Dung, we are interested in the problem of deciding which set of acceptable arguments support the decision making in...
Mauricio Osorio, Claudia Zepeda, Juan Carlos Nieve...
ICRA
1993
IEEE
152views Robotics» more  ICRA 1993»
15 years 5 months ago
The USC Autonomous Flying Vehicle: An Experiment in Real Time Behavior-Based Control
A control system architecture is described for an autonomous flying vehicle. The vehicle, equipped with fourteen sensors, uses a model helicopter as an airframe. The control syste...
M. Anthony Lewis, Andrew H. Fagg, George A. Bekey
FOSSACS
2006
Springer
15 years 5 months ago
Propositional Dynamic Logic with Recursive Programs
We extend the propositional dynamic logic PDL of Fischer and Ladner with a restricted kind of recursive programs using the formalism of visibly pushdown automata (Alur, Madhusudan...
Christof Löding, Olivier Serre