This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
In the context of battery-powered real-time systems three constraints need to be addressed: energy, deadlines and task rewards. Many future real-time systems will count on differe...
Gamification, the use of game mechanics in non-gaming applications, has been applied to various systems to encourage desired user behaviors. In this paper, we examine patterns of ...
Jennifer Thom-Santelli, David R. Millen, Joan Morr...
We design a class of submodular functions meant for document summarization tasks. These functions each combine two terms, one which encourages the summary to be representative of ...
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...