Sciweavers

6195 search results - page 116 / 1239
» Cloud Computing Security
Sort
View
147
Voted
TC
2008
15 years 3 months ago
On the Computational Security of a Distributed Key Distribution Scheme
In a distributed key distribution scheme, a set of servers help a set of users in a group to securely obtain a common key. Security means that an adversary who corrupts some server...
Vanesa Daza, Javier Herranz, Germán S&aacut...
129
Voted
EUROCRYPT
2004
Springer
15 years 9 months ago
Multi-party Computation with Hybrid Security
It is well-known that n players connected only by pairwise secure channels can achieve multi-party computation secure against an active adversary if and only if – t < n/2 of t...
Matthias Fitzi, Thomas Holenstein, Jürg Wulls...
SIGGRAPH
2010
ACM
15 years 8 months ago
SmartBoxes for interactive urban reconstruction
We introduce an interactive tool which enables a user to quickly assemble an architectural model directly over a 3D point cloud acquired from large-scale scanning of an urban scen...
Liangliang Nan, Andrei Sharf, Hao Zhang, Daniel Co...
CVPR
2010
IEEE
15 years 8 months ago
Model Globally, Match Locally: Efficient and Robust 3D Object Recognition
This paper addresses the problem of recognizing freeform 3D objects in point clouds. Compared to traditional approaches based on point descriptors, which depend on local informati...
Bertram Drost, Markus Ulrich, Nassir Navab, Slobod...
CAMP
2005
IEEE
15 years 6 months ago
An Open System for 3D Data Acquisition from Multiple Sensor
Abstract— This paper describes a work in progress on a multisensor system for 3D data acquisition. The system core structure is a 3D-range scan based on the well known active tri...
Francesco Isgrò, Francesca Odone, Alessandr...