Sciweavers

4529 search results - page 24 / 906
» Position Based Cryptography
Sort
View
ICRA
2000
IEEE
121views Robotics» more  ICRA 2000»
15 years 4 months ago
2 1/2 D Visual Servoing: A Possible Solution to Improve Image-Based and Position-Based Visual Servoings
We describe in this paper potential problems that may appear in image-based visual servoing when the initial camera position is far away from its desired position. We show by conc...
François Chaumette, Ezio Malis
ISSAC
2007
Springer
132views Mathematics» more  ISSAC 2007»
15 years 6 months ago
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
EUROPKI
2004
Springer
15 years 5 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
15 years 3 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
ICIAP
2009
ACM
15 years 6 months ago
Hallucinating Faces: Global Linear Modal Based Super-Resolution and Position Based Residue Compensation
A learning-based face hallucination method is proposed in this paper for the reconstruction of a high-resolution face image from a low-resolution observation based on a set of high...
Xiang Ma, Junping Zhang, Chun Qi