Sciweavers

38 search results - page 8 / 8
» Identity Based Threshold Proxy Signcryption Scheme
Sort
View
CCS
2005
ACM
13 years 9 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
ICRA
2009
IEEE
159views Robotics» more  ICRA 2009»
13 years 10 months ago
Tendon-based transmission systems for robotic devices: Models and control algorithms
— Tendon-based transmission systems present many positive aspects and greatly simplify the mechanical design of small robotic devices, such as robotic fingers. On the other hand...
Gianluca Palli, Gianni Borghesan, Claudio Melchior...
MANSCI
2008
119views more  MANSCI 2008»
13 years 3 months ago
Service-Level Differentiation in Call Centers with Fully Flexible Servers
We study large-scale service systems with multiple customer classes and many statistically identical servers. The following question is addressed: How many servers are required (s...
Itay Gurvich, Mor Armony, Avishai Mandelbaum