×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [impossibility results]
Home >
impossibility results
1 Vipul Goyal Microsoft Research, India Secure Composition of Cryptographic Protocols.
217 views
CONTRACTS LAW IN ASIA INDONESIAN CONTRACT LAW: CIVIL LAW, LEGAL PLURALISM & CONTINUITY Prof David K. Linnan Class Five- LAW E506 01/21/04.
216 views
Non-Uniform ACC Circuit Lower Bounds Ryan Williams IBM Almaden TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
215 views
Collusion-Resistant Mechanisms with Verification Yielding Optimal Solutions Carmine Ventre (University of Liverpool) Joint work with: Paolo Penna (University.
212 views
1 Leader Election. 2 Leader Election (LE) problem In a DS, it is often needed to designate a single processor (i.e., a leader) as the coordinator of some.
213 views
Crm Esa08 1234869680124198 3
210 views
The Assignment Problem With Ordinal Preferences
219 views
Cope with selfish and malicious nodes Jinyang Li.
224 views
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen.
217 views
Yevgeniy Dodis Iftach Haitner Aris Tentes On the (In)Security of RSA Signatures 1.
220 views
On Minimal Assumptions for Sender-Deniable Public Key Encryption Dana Dachman-Soled University of Maryland.
221 views
Leader Election. Leader Election: the idea We study Leader Election in rings.
226 views
Next >