The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...
The amount of information held by organizations’ databases is increasing very quickly. A recently proposed solution to the problem of data management, which is becoming increasi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
The three-dimensional reconstruction of real objects is an important topic in computer vision. Most of the acquisition systems are limited to reconstruct a partial view of the obj...
Joaquim Salvi, Carles Matabosch, David Fofi, Josep...
A Partial Order and partial reliable Connection (POC) is an end-to-end transport connection authorized to deliver objects in an order that can differ from the transmitted one. Such...
Luis Rojas-Cardenas, Emmanuel Chaput, Laurent Dair...