Sciweavers

3702 search results - page 38 / 741
» All Pairings Are in a Group
Sort
View
112
Voted
PAIRING
2007
Springer
148views Cryptology» more  PAIRING 2007»
15 years 6 months ago
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
This paper puts forward new efficient constructions for public-key broadcast encryption that simultaneously enjoy the following properties: receivers are stateless; encryption is c...
Cécile Delerablée, Pascal Paillier, ...
120
Voted
EUROPKI
2005
Springer
15 years 6 months ago
A Multipurpose Delegation Proxy for WWW Credentials
Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can t...
Tobias Straub, Thilo-Alexander Ginkel, Johannes Bu...
SCVMA
2004
Springer
15 years 5 months ago
Segregation of Moving Objects Using Elastic Matching
We present a method for figure-ground segregation of moving objects from monocular video sequences. The approach is based on tracking extracted contour fragments, in contrast to ...
Vishal Jain, Benjamin B. Kimia, Joseph L. Mundy
75
Voted
LREC
2010
194views Education» more  LREC 2010»
15 years 1 months ago
Building a Gold Standard for Event Detection in Croatian
This paper describes the process of building a newspaper corpus annotated with events described in specific documents. The main difference to the corpora built as part of the TDT ...
Nikola Ljubesic, Tomislava Lauc, Damir Boras
103
Voted
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 17 days ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja