Sciweavers

195 search results - page 14 / 39
» E-voting - a Key to Independence for All
Sort
View
JCS
2007
120views more  JCS 2007»
15 years 1 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
126
Voted
DISOPT
2008
89views more  DISOPT 2008»
15 years 1 months ago
Group sequencing around a common due date
The problem of scheduling groups of jobs on a single machine under the group technology assumption is studied. Jobs of the same group are processed contiguously and a sequence ind...
T. C. Edwin Cheng, Mikhail Y. Kovalyov, C. T. Ng, ...
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
16 years 2 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
ISBI
2004
IEEE
16 years 2 months ago
Model Based Symmetric Information Theoretic Large Deformation Multi-Modal Image Registration
This paper presents a Bayesian framework for generating inverse-consistent inter-subject large deformation transformations between two multi-modal image sets of the brain. In this...
Peter Lorenzen, Brad Davis, Sarang C. Joshi
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
16 years 2 months ago
A Multi-paradigm Querying Approach for a Generic Multimedia Database Management System
To truly meet the requirements of multimedia database (MMDB) management, an integrated framework for modeling, managing and retrieving various kinds of media data in a uniform way...
Ji-Rong Wen, Qing Li, Wei-Ying Ma, HongJiang Zhang