Sciweavers

1992 search results - page 249 / 399
» On the (limited) power of non-equivocation
Sort
View
EUC
2005
Springer
15 years 7 months ago
Ubiquitous Learning on Pocket SCORM
With advanced technologies, computer devices have become smaller and powerful. As a result, many people enjoy ubiquitous learning using mobile devices such as Pocket PCs. Pocket PC...
Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nige...
FC
2005
Springer
98views Cryptology» more  FC 2005»
15 years 7 months ago
Secure Biometric Authentication for Weak Computational Devices
This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can...
Mikhail J. Atallah, Keith B. Frikken, Michael T. G...
ICALP
2005
Springer
15 years 7 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
ICCS
2005
Springer
15 years 7 months ago
Dynamic Data Driven Coupling of Continuous and Discrete Methods for 3D Tracking
We present a new framework for robust 3D tracking, using a dynamic data driven coupling of continuous and discrete methods to overcome their limitations. Our method uses primarily ...
Dimitris N. Metaxas, Gabriel Tsechpenakis
ISPEC
2005
Springer
15 years 7 months ago
Token-Controlled Public Key Encryption
Token-controlled public key encryption (TCPKE) schemes, introduced in [1], offer many possibilities of application in financial or legal scenarios. Roughly speaking, in a TCPKE s...
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo