Sciweavers

4529 search results - page 23 / 906
» Position Based Cryptography
Sort
View
ICS
2010
Tsinghua U.
15 years 9 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
DIM
2005
ACM
15 years 1 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 11 days ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
CCS
2007
ACM
15 years 6 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
IROS
2009
IEEE
129views Robotics» more  IROS 2009»
15 years 6 months ago
Base force/torque sensing for position based Cartesian impedance control
Abstract— In this paper, a position based impedance controller (i.e. admittance controller) is designed by utilizing measurements of a force/torque sensor, which is mounted at th...
Christian Ott, Yoshihiko Nakamura