Sciweavers

65 search results - page 12 / 13
» Space-Efficient Identity Based Encryption Without Pairings
Sort
View
CCS
2008
ACM
13 years 8 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
MVA
2007
186views Computer Vision» more  MVA 2007»
13 years 5 months ago
Probabilistic-topological calibration of widely distributed camera networks
Abstract We propose a method for estimating the topology of distributed cameras, which can provide useful information for multi-target tracking in a wide area, without object ident...
Norimichi Ukita
SOCA
2007
IEEE
14 years 15 days ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
MOBISEC
2009
Springer
14 years 24 days ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 7 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim