Sciweavers

171
Voted
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
201
Voted
CRYPTO
2007
Springer
172views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Deterministic and Efficiently Searchable Encryption
We present as-strong-as-possible definitions of privacy, and constructions achieving them, for public-key encryption schemes where the encryption algorithm is deterministic. We ob...
Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
179
Voted
CHINZ
2009
ACM
15 years 9 months ago
Ambient environments for emotional physical communication
This paper extends our understanding of existing physical and gestural interfaces and presents a potential design space in affective computing using human movement as a form of em...
Michelle Li, He Jianting
SOCO
2010
Springer
15 years 9 months ago
An Advice for Advice Composition in AspectJ
Aspect composition often involves advice interference and this is a crucial problem in aspect oriented programming. When multiple advices are woven at the same join point, the advi...
Fuminobu Takeyama, Shigeru Chiba
146
Voted
CRV
2007
IEEE
101views Robotics» more  CRV 2007»
15 years 9 months ago
Energy Efficient Robot Rendezvous
We examine the problem of finding a single meeting location for a group of heterogeneous autonomous mobile robots, such that the total system cost of traveling to the rendezvous i...
Pawel Zebrowski, Yaroslav Litus, Richard T. Vaugha...