We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
—Autonomic computing is a paradigm that aims at reducing administrative overhead by providing autonomic managers to make applications self-managing. In order to better deal with ...
Ahmad Al-Shishtawy, Vladimir Vlassov, Per Brand, S...
—In professional tennis training matches, the coach needs to be able to view play from the most appropriate angle in order to monitor players activities. In this paper, we presen...
Richard Tynan, Anthony Schoofs, Conor Muldoon, Gre...
Traditional schema matchers use a set of distinct simple matchers and use a composition function to combine the individual scores using an arbitrary order of matcher application l...
ABSTRACT. A non-local box is an abstract device into which Alice and Bob input bits x and y respectively and receive outputs a and b respectively, where a, b are uniformly distribu...
Marc Kaplan, Iordanis Kerenidis, Sophie Laplante, ...