Sciweavers

2259 search results - page 25 / 452
» Separation and information hiding
Sort
View
EUROCRYPT
2012
Springer
13 years 2 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
ICHIT
2009
Springer
15 years 6 months ago
Middleware-based distributed systems software process
Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific service...
Liu Jingyong, Zhong Yong, Chen Yong, Zhang Lichen
IH
2004
Springer
15 years 5 months ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
TASLP
2002
142views more  TASLP 2002»
14 years 11 months ago
Geometric source separation: merging convolutive source separation with geometric beamforming
Convolutive blind source separation and adaptive beamforming have a similar goal--extracting a source of interest (or multiple sources) while reducing undesired interferences. A be...
Lucas C. Parra, Christopher V. Alvino
CTRSA
2009
Springer
95views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Statistically Hiding Sets
Zero-knowledge set is a primitive introduced by Micali, Rabin, and Kilian (FOCS 2003) which enables a prover to commit a set to a verifier, without revealing even the size of the...
Manoj Prabhakaran, Rui Xue