Sciweavers

24188 search results - page 219 / 4838
» Computing on Encrypted Data
Sort
View
123
Voted
CCIA
2009
Springer
15 years 4 months ago
A Cryptographic Solution for Private Distributed Simple Meeting Scheduling
Meeting Scheduling is a suitable application for distributed computation, motivated by its privacy requirements. Previous work on this problem have considered some cryptographic te...
Javier Herranz, Stan Matwin, Pedro Meseguer, Jordi...
AMC
2005
188views more  AMC 2005»
15 years 3 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
142
Voted
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
15 years 22 days ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu
132
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup
127
Voted
VISUALIZATION
2002
IEEE
15 years 8 months ago
Christmas Tree Case Study: Computed Tomography as a Tool for Mastering Complex Real World Objects with Applications in Computer
We report on using computed tomography (CT) as a model acquisition tool for complex objects in computer graphics. Unlike other modeling and scanning techniques the complexity of t...
Armin Kanitsar, Thomas Theußl, Lukas Mroz, M...