Sciweavers

2055 search results - page 344 / 411
» Generic Model Refactorings
Sort
View
116
Voted
BTW
2007
Springer
189views Database» more  BTW 2007»
15 years 7 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz
ESORICS
2007
Springer
15 years 7 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
EUROCRYPT
2007
Springer
15 years 7 months ago
Simulatable Adaptive Oblivious Transfer
We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that ...
Jan Camenisch, Gregory Neven, Abhi Shelat
IBPRIA
2007
Springer
15 years 7 months ago
Robust Lane Lines Detection and Quantitative Assessment
Detection of lane markings based on a camera sensor can be a low cost solution to lane departure and curve over speed warning. A number of methods and implementations have been rep...
Antonio M. López, Joan Serrat, Cristina Ca&...