Sciweavers

1058 search results - page 120 / 212
» Secure Group Communications Using Key Graphs
Sort
View
120
Voted
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 6 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
103
Voted
TELSYS
2008
98views more  TELSYS 2008»
15 years 2 months ago
Multicast deflector
Abstract Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast...
António Pinto, Manuel Ricardo
ATAL
2006
Springer
15 years 6 months ago
Social coordination without communication in multi-agent territory exploration tasks
In the recent past, several different methods for coordinating behavior in multi-robot teams have been proposed. Common to most of them is the use of communication to coordinate b...
Paul W. Schermerhorn, Matthias Scheutz
113
Voted
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
15 years 3 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
132
Voted
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 6 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot