Sciweavers

10088 search results - page 1881 / 2018
» Queries and Computation on the Web
Sort
View
IJISEC
2007
61views more  IJISEC 2007»
15 years 1 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
IMCS
2007
144views more  IMCS 2007»
15 years 1 months ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova
FUIN
2010
130views more  FUIN 2010»
15 years 3 days ago
SLGAD Resolution for Inference on Logic Programs with Annotated Disjunctions
Abstract. Logic Programs with Annotated Disjunctions (LPADs) allow to express probabilistic information in logic programming. The semantics of an LPAD is given in terms of the well...
Fabrizio Riguzzi
PKC
2011
Springer
185views Cryptology» more  PKC 2011»
14 years 4 months ago
Signatures on Randomizable Ciphertexts
xtended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC 2011 (6–9 march 2011, Taormina, Italy) D. Catalano, N. F...
Olivier Blazy, Georg Fuchsbauer, David Pointcheval...
SIGCOMM
2012
ACM
13 years 4 months ago
CarSpeak: a content-centric network for autonomous driving
This paper introduces CarSpeak, a communication system for autonomous driving. CarSpeak enables a car to query and access sensory information captured by other cars in a manner si...
Swarun Kumar, Lixin Shi, Nabeel Ahmed, Stephanie G...
« Prev « First page 1881 / 2018 Last » Next »