Sciweavers

1985 search results - page 253 / 397
» A Minimal Periods Algorithm with Applications
Sort
View
112
Voted
CCS
2005
ACM
15 years 9 months ago
Untraceable RFID tags via insubvertible encryption
We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain u...
Giuseppe Ateniese, Jan Camenisch, Breno de Medeiro...
ECML
2005
Springer
15 years 9 months ago
Fitting the Smallest Enclosing Bregman Ball
Finding a point which minimizes the maximal distortion with respect to a dataset is an important estimation problem that has recently received growing attentions in machine learnin...
Richard Nock, Frank Nielsen
106
Voted
PERVASIVE
2005
Springer
15 years 9 months ago
Tracking Locations of Moving Hand-Held Displays Using Projected Light
Abstract. Researchers have recently demonstrated display positioning using optical sensors in conjunction with temporally-coded patterns of projected light. This paper extends that...
Jay Summet, Rahul Sukthankar
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 9 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
VTS
2003
IEEE
127views Hardware» more  VTS 2003»
15 years 8 months ago
Bist Reseeding with very few Seeds
Reseeding is used to improve fault coverage of pseudorandom testing. The seed corresponds to the initial state of the LFSR before filling the scan chain. The number of determinist...
Ahmad A. Al-Yamani, Subhasish Mitra, Edward J. McC...