Sciweavers

893 search results - page 61 / 179
» Descent Theory for Schemes
Sort
View
CORR
2007
Springer
147views Education» more  CORR 2007»
14 years 12 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
CCR
2000
101views more  CCR 2000»
14 years 11 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
ICRA
2010
IEEE
147views Robotics» more  ICRA 2010»
14 years 10 months ago
Two-phased controller for a pair of 2-DOF soft fingertips based on the qualitative relationship between joint angles and object
— We have previously shown that hemispherical soft fingertips are at equilibrium when they are in contact with objects, suggesting that the contact force and flexibility of the...
Yujiro Yamazaki, Takahiro Inoue, Shinichi Hirai
WWW
2008
ACM
16 years 16 days ago
Dynamic cost-per-action mechanisms and applications to online advertising
We study the Cost-Per-Action or Cost-Per-Acquisition (CPA) charging scheme in online advertising. In this scheme, instead of paying per click, the advertisers pay only when a user...
Hamid Nazerzadeh, Amin Saberi, Rakesh Vohra
MOBIHOC
2008
ACM
15 years 11 months ago
A game approach for multi-channel allocation in multi-hop wireless networks
Channel allocation was extensively investigated in the framework of cellular networks, but it was rarely studied in the wireless ad-hoc networks, especially in the multi-hop ad-ho...
Lin Gao, Xinbing Wang