×

Found 142 Documents (Results 1–100)

Higher-order masked Saber. (English) Zbl 1518.94076

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 13th International conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13409, 93-116 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Towards witness encryption without multilinear maps. (English) Zbl 07628042

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 28-47 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Revocable hierarchical identity-based authenticated key exchange. (English) Zbl 07628041

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 3-27 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple envy-free and truthful mechanisms for cake cutting with a small number of cuts. (English) Zbl 07788641

Ahn, Hee-Kap (ed.) et al., 32nd international symposium on algorithms and computation, ISAAC 2021, Fukuoka, Japan, December 6–8, 2021. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 212, Article 68, 17 p. (2021).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI

Mechanism design for facility location with fractional preferences and minimum distance. (English) Zbl 07670488

Chen, Chi-Yeh (ed.) et al., Computing and combinatorics. 27th international conference, COCOON 2021, Tainan, Taiwan, October 24–26, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13025, 499-511 (2021).
MSC:  68Rxx
PDFBibTeX XMLCite
Full Text: DOI

Cake cutting: an envy-free and truthful mechanism with a small number of cuts. (English) Zbl 07765373

Cao, Yixin (ed.) et al., 31st international symposium on algorithms and computation, ISAAC 2020, Hong Kong, China, virtual conference, December 14–18, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 181, Article 15, 16 p. (2020).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI

Enhanced Bayesian network models for spatial time series prediction. Recent research trend in data-driven predictive analytics. (English) Zbl 1445.62001

Studies in Computational Intelligence 858. Cham: Springer (ISBN 978-3-030-27748-2/hbk; 978-3-030-27749-9/ebook). xxiii, 149 p. (2020).
PDFBibTeX XMLCite
Full Text: DOI

Obviously strategy-proof mechanisms for machine scheduling. (English) Zbl 07525483

Bender, Michael A. (ed.) et al., 27th annual European symposium on algorithms, ESA 2019, Munich/Garching, Germany, September 9–11, 2019. Proceedings. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 144, Article 46, 15 p. (2019).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI

Cost sharing over combinatorial domains: complement-free cost functions and beyond. (English) Zbl 07525457

Bender, Michael A. (ed.) et al., 27th annual European symposium on algorithms, ESA 2019, Munich/Garching, Germany, September 9–11, 2019. Proceedings. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 144, Article 20, 17 p. (2019).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

The consensus games for consensus economics under the framework of blockchain in Fintech. (English) Zbl 1439.91006

Li, Deng-Feng (ed.), Game theory. Third East Asia game theory international conference, EAGT 2019, Fuzhou, Fujian, China, March 7–9, 2019. Revised selected papers. Singapore: Springer. Commun. Comput. Inf. Sci. 1082, 1-26 (2019).
PDFBibTeX XMLCite
Full Text: DOI

Prediction based reverse auction incentive mechanism for mobile crowdsensing system. (English) Zbl 1435.68055

Li, Yingshu (ed.) et al., Combinatorial optimization and applications. 13th international conference, COCOA 2019, Xiamen, China, December 13–15, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11949, 541-552 (2019).
PDFBibTeX XMLCite
Full Text: DOI

Curves with special aesthetics generated by an original mechanism. (English) Zbl 1400.68255

Cocchiarella, Luigi (ed.), ICGG 2018 – Proceedings of the 18th international conference on geometry and graphics. 40th anniversary – Milan, Italy, August 3–7, 2018. In 2 volumes. Cham: Springer; Milan: Politecnico de Milano (ISBN 978-3-319-95587-2/pbk; 978-3-319-95588-9/ebook). Advances in Intelligent Systems and Computing 809, 1377-1390 (2019).
MSC:  68U07 51M15 68U05
PDFBibTeX XMLCite
Full Text: DOI

Revisiting the incentive mechanism of Bitcoin-NG. (English) Zbl 1509.91044

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 706-719 (2018).
MSC:  91G99 68P25
PDFBibTeX XMLCite
Full Text: DOI

Tightly secure ring-LWE based key encapsulation with short ciphertexts. (English) Zbl 1500.94016

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 29-46 (2017).
MSC:  94A60 68M25 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Lossy key encapsulation mechanism and its applications. (English) Zbl 1381.94079

Hong, Seokhie (ed.) et al., Information security and cryptology – ICISC 2016. 19th international conference, Seoul, South Korea, November 30 – December 2, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-53176-2/pbk; 978-3-319-53177-9/ebook). Lecture Notes in Computer Science 10157, 126-144 (2017).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Is privacy compatible with truthfulness? (English) Zbl 1361.68076

Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 67-86 (2013).
MSC:  68P15 68P30 91A80
PDFBibTeX XMLCite
Full Text: DOI

Attribute-based identification: definitions and efficient constructions. (English) Zbl 1316.94056

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 168-186 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Identification schemes from key encapsulation mechanisms. (English) Zbl 1280.94103

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 59-76 (2011).
PDFBibTeX XMLCite
Full Text: DOI

Encryption simulatability reconsidered. (English) Zbl 1325.68084

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 14-23 (2011).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

A contents encryption mechanism using reused key in IPTV. (English) Zbl 1209.68222

Park, Jong Hyuk (ed.) et al., Advances in information security and its application. Third international conference, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02632-4/pbk; 978-3-642-02633-1/ebook). Communications in Computer and Information Science 36, 85-90 (2009).
MSC:  68P25 68M11
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software