Sciweavers

1094 search results - page 185 / 219
» List signature schemes
Sort
View
75
Voted
IJACT
2010
67views more  IJACT 2010»
14 years 4 months ago
On message recognition protocols: recoverability and explicit confirmation
: We look at message recognition protocols (MRPs) and prove that there is a oneto-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we ...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
125
Voted

Publication
158views
16 years 8 months ago
Fair Flow Control for ATM-ABR Multipoint Connections
Multipoint-to-multipoint communication can be implemented by combining the point-to-multipoint and multipoint-to-point connection algorithms. In an ATM multipoint-to-point connecti...
Sonia Fahmy, Raj Jain, Rohit Goyal, and Bobby Vand...
90
Voted
ICPR
2000
IEEE
15 years 10 months ago
Trinocular Stereo for Non-Parallel Configurations
The constraint of a third camera in stereo vision is a useful tool for reducing ambiguity in matching. Most of the systems using trinocular stereo to date however, have used confi...
Jane Mulligan, Konstantinos Daniilidis
86
Voted
ICCAD
2005
IEEE
151views Hardware» more  ICCAD 2005»
15 years 6 months ago
Architecture and details of a high quality, large-scale analytical placer
Modern design requirements have brought additional complexities to netlists and layouts. Millions of components, whitespace resources, and fixed/movable blocks are just a few to ...
Andrew B. Kahng, Sherief Reda, Qinke Wang
83
Voted
CIKM
2009
Springer
15 years 4 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau