The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Alice wants to prove that she is young enough to borrow money from her bank, without revealing her age. She therefore needs a tool for proving that a committed number lies in a spe...
Sensor networks are a very specific type of wireless networks where both security and performance issues need to be solved efficiently in order to avoid manipulations of the sensed...
With the explosion of the Internet the World Wide Web today has become an infinite source of information. Hence, it is important that one be able to categorize, understand and be a...
Vishal Anand, Keith Hansen, Radu Jianu, Adrian Rus...
Developing a vision based, efficient and automatic lane detection system from a moving vehicle is a challenging task mainly due to poor quality of lane markings, occlusion created...
Rudra N. Hota, Shahanaz Syed, Subhadip Bandyopadhy...