Sciweavers

20 search results - page 3 / 4
» Construction of Dynamic Threshold Decryption Scheme from Pai...
Sort
View
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
85
Voted
EUROCRYPT
2009
Springer
15 years 10 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
ACNS
2005
Springer
134views Cryptology» more  ACNS 2005»
15 years 3 months ago
Dynamic k-Times Anonymous Authentication
k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
Lan Nguyen, Reihaneh Safavi-Naini
97
Voted
ICDCS
2009
IEEE
15 years 6 months ago
MOPS: Providing Content-Based Service in Disruption-Tolerant Networks
—Content-based service, which dynamically routes and delivers events from sources to interested users, is extremely important to network services. However, existing content-based...
Feng Li, Jie Wu
TVCG
2008
100views more  TVCG 2008»
14 years 9 months ago
Two-Character Motion Analysis and Synthesis
In this paper, we deal with the problem of synthesizing novel motions of standing-up martial arts such as Kickboxing, Karate, and Taekwondo performed by a pair of humanlike charact...
Taesoo Kwon, Young-Sang Cho, Sang Il Park, Sung Yo...