Sciweavers

7623 search results - page 1275 / 1525
» Constructive Volume Modeling
Sort
View
AOSE
2007
Springer
15 years 10 months ago
O-MaSE: A Customizable Approach to Developing Multiagent Development Processes
This paper describes the Organization-based Multiagent System Engineering (O-MaSE) Process Framework, which helps process engineers define custom multiagent systems development pr...
Juan C. García-Ojeda, Scott A. DeLoach, Rob...
CCS
2007
ACM
15 years 10 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz
DCOSS
2007
Springer
15 years 10 months ago
A Semantics-Based Middleware for Utilizing Heterogeneous Sensor Networks
With the proliferation of various kinds of sensor networks, we will see large amounts of heterogeneous data. They have different characteristics such as data content, formats, mod...
Eric Bouillet, Mark Feblowitz, Zhen Liu, Anand Ran...
EUROCRYPT
2007
Springer
15 years 10 months ago
Mesh Signatures
sion of an extended abstract to be published in Advances in Cryptology—EUROCRYPT 2007, Springer-Verlag, 2007. Available online from the IACR Cryptology ePrint Archive as Report 2...
Xavier Boyen
« Prev « First page 1275 / 1525 Last » Next »