Sciweavers

8825 search results - page 139 / 1765
» All for one or one for all
Sort
View
TCC
2010
Springer
178views Cryptology» more  TCC 2010»
15 years 10 months ago
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new choice of parameters. By a recent classical reduction by Peikert we prove the scheme sema...
Rikke Bendlin, Ivan Damgård
STACS
2007
Springer
15 years 7 months ago
Broadcasting vs. Mixing and Information Dissemination on Cayley Graphs
One frequently studied problem in the context of information dissemination in communication networks is the broadcasting problem. In this paper, we study the following randomized b...
Robert Elsässer, Thomas Sauerwald
ACCV
2006
Springer
15 years 7 months ago
A Multiphase Level Set Based Segmentation Framework with Pose Invariant Shape Priors
Level set based segmentation has been used with and without shape priors, to approach difficult segmentation problems in several application areas. This paper addresses two limita...
Michael Fussenegger, Rachid Deriche, Axel Pinz
ICSM
2005
IEEE
15 years 7 months ago
A Risk Taxonomy Proposal for Software Maintenance
There can be no doubt that risk management is an important activity in the software engineering area. One proof of this is the large body of work existing in this area. However, w...
Kenia P. Batista Webster, Káthia Març...
EUROPKI
2005
Springer
15 years 6 months ago
A Multipurpose Delegation Proxy for WWW Credentials
Credentials like passwords or cryptographic key pairs are a means to prove one’s identity to a web server. A practical problem in this context is the question of how a user can t...
Tobias Straub, Thilo-Alexander Ginkel, Johannes Bu...