Sciweavers

6195 search results - page 249 / 1239
» Cloud Computing Security
Sort
View
INFORMATICALT
2010
102views more  INFORMATICALT 2010»
15 years 2 months ago
An Computation-Efficient Generalized Group-Oriented Cryptosystem
A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the me...
Ting-Yi Chang
CVPR
2012
IEEE
13 years 7 months ago
Real-time image-based 6-DOF localization in large-scale environments
We present a real-time approach for image-based localization within large scenes that have been reconstructed offline using structure from motion (Sfm). From monocular video, our...
Hyon Lim, Sudipta N. Sinha, Michael F. Cohen, Matt...
149
Voted
EUROCRYPT
2006
Springer
15 years 8 months ago
Efficient Binary Conversion for Paillier Encrypted Values
We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer,
Berry Schoenmakers, Pim Tuyls
123
Voted
MOBIHOC
2001
ACM
16 years 4 months ago
Secure pebblenets
Stefano Basagni, Kris Herrin, Danilo Bruschi, Emil...
135
Voted
EWSN
2007
Springer
16 years 4 months ago
Secure Data Aggregation with Multiple Encryption
Melek Önen, Refik Molva