Sciweavers

4529 search results - page 13 / 906
» Position Based Cryptography
Sort
View
EUROCRYPT
2003
Springer
15 years 5 months ago
CAPTCHA: Using Hard AI Problems for Security
We introduce captcha, an automated test that humans can pass, but current computer programs can’t pass: any program that has high success over a captcha can be used to solve an u...
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, Joh...
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
AAAI
1996
15 years 1 months ago
Estimating the Absolute Position of a Mobile Robot Using Position Probability Grids
In order to re-use existing models of the environment mobile robots must be able to estimate their position and orientation in such models. Most of the existing methods for positi...
Wolfram Burgard, Dieter Fox, Daniel Hennig, Timo S...
DAM
2008
92views more  DAM 2008»
14 years 12 months ago
Applications to cryptography of twisting commutative algebraic groups
We give an overview on twisting commutative algebraic groups and applications to discrete log based cryptography. We explain how discrete log based cryptography over extension fie...
Alice Silverberg
FOCS
2007
IEEE
15 years 6 months ago
Cryptography from Sunspots: How to Use an Imperfect Reference String
The Common Reference String (CRS) model equips all protocol participants with a common string that is sampled from a pre-specified distribution, say the uniform distribution. Thi...
Ran Canetti, Rafael Pass, Abhi Shelat