International audienceGiven a directed graph G and a set R of vertex pairs, the Minimum Certificate Dispersal problem asks for an assignment of arcs to vertices ("terminals") such that, for each ( u , v ) ¿ R , a u-v-path can be constructed using only arcs assigned to u or v. Herein, the total number k of assignments should be minimal. The problem is well motivated in key-exchange protocols for asymmetric cryptography. We provide a first parameterized complexity analysis of this NP-hard problem and its variant ChainedMinimum Certificate Dispersal, where, instead of pairs of terminals, a set of paths ("chains") that should be constructed, is prescribed.Although polynomial-time solvable for constant values of k, the former variant seems much ...
A certificate system can be represented by a directed graph, called a certificate graph, where each ...
Abstract. We revisit the problem of nding k paths with a minimum number of shared edges between two ...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
AbstractGiven an n-vertex directed graph G=(V,E) and a set R⊆V×V of requests, we consider assigning ...
Given an n-vertex directed graph G = (V;E) and a set R ⊆ V × V of requests,we consider to assign a s...
Computing and Combinatorics, 15th Annual International Conference, COCOON : Niagara Falls, NY, USA, ...
Abstract — We investigate how to disperse the certificates, issued in an ad hoc network, among the n...
A certificate for the k connectivity y of a graph G =(V#E)isasubsetE of E such that (V#E )i...
textA certificate is a way to distribute public keys of users in a distributed system. For example...
Key distribution schemes play a significant role in key assignment schemes which allow participants ...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
grantor: University of TorontoAn isomorphism certificate (I.C.) for a graph is a set of la...
Abstract. Motivated by recent applications of pushdown systems to computer security problems, we pre...
Recent work in dynamic graph algorithms has led to efficient algorithms for dynamic undirected graph...
The notion of Turing kernelization investigates whether a polynomial-time algorithm can solve an NP-...
A certificate system can be represented by a directed graph, called a certificate graph, where each ...
Abstract. We revisit the problem of nding k paths with a minimum number of shared edges between two ...
International audienceThere is a large amount of work dedicated to the formal verification of securi...
AbstractGiven an n-vertex directed graph G=(V,E) and a set R⊆V×V of requests, we consider assigning ...
Given an n-vertex directed graph G = (V;E) and a set R ⊆ V × V of requests,we consider to assign a s...
Computing and Combinatorics, 15th Annual International Conference, COCOON : Niagara Falls, NY, USA, ...
Abstract — We investigate how to disperse the certificates, issued in an ad hoc network, among the n...
A certificate for the k connectivity y of a graph G =(V#E)isasubsetE of E such that (V#E )i...
textA certificate is a way to distribute public keys of users in a distributed system. For example...
Key distribution schemes play a significant role in key assignment schemes which allow participants ...
. A minimal cutset of a tree directed from the leaves to the root is a minimal set of vertices such ...
grantor: University of TorontoAn isomorphism certificate (I.C.) for a graph is a set of la...
Abstract. Motivated by recent applications of pushdown systems to computer security problems, we pre...
Recent work in dynamic graph algorithms has led to efficient algorithms for dynamic undirected graph...
The notion of Turing kernelization investigates whether a polynomial-time algorithm can solve an NP-...
A certificate system can be represented by a directed graph, called a certificate graph, where each ...
Abstract. We revisit the problem of nding k paths with a minimum number of shared edges between two ...
International audienceThere is a large amount of work dedicated to the formal verification of securi...