Sciweavers

7623 search results - page 1206 / 1525
» Constructive Volume Modeling
Sort
View
CRYPTO
2011
Springer
232views Cryptology» more  CRYPTO 2011»
14 years 4 months ago
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Structure-preserving signatures are signatures defined over bilinear groups that rely on generic group operations. In particular, the messages and signatures consist of group elem...
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, M...
HOST
2011
IEEE
14 years 4 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
IACR
2011
129views more  IACR 2011»
14 years 4 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
IACR
2011
152views more  IACR 2011»
14 years 4 months ago
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
Abstract. In Asiacrypt 2010, Groth constructed the only previously known sublinearcommunication NIZK argument for circuit satisfiability in the common reference string model. We p...
Helger Lipmaa
INFOCOM
2012
IEEE
13 years 7 months ago
Algorithm design for femtocell base station placement in commercial building environments
Abstract—Although femtocell deployments in residential buildings have been increasingly prevalent, femtocell deployment in commercial building environments remains in its infancy...
Jia Liu, Qian Chen, Hanif D. Sherali
« Prev « First page 1206 / 1525 Last » Next »