Sciweavers

199 search results - page 37 / 40
» Adaptive Proofs of Knowledge in the Random Oracle Model
Sort
View
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
15 years 11 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
CVPR
2007
IEEE
16 years 1 months ago
OPTIMOL: automatic Online Picture collecTion via Incremental MOdel Learning
A well-built dataset is a necessary starting point for advanced computer vision research. It plays a crucial role in evaluation and provides a continuous challenge to stateof-the-...
Li-Jia Li, Gang Wang, Fei-Fei Li 0002
SODA
1998
ACM
99views Algorithms» more  SODA 1998»
15 years 14 days ago
Online Throughput-Competitive Algorithm for Multicast Routing and Admission Control
We present the first polylog-competitive online algorithm for the general multicast admission control and routing problem in the throughput model. The ratio of the number of reque...
Ashish Goel, Monika Rauch Henzinger, Serge A. Plot...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
15 years 11 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
EUROCRYPT
2001
Springer
15 years 3 months ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold