Sciweavers

590 search results - page 110 / 118
» Short Group Signatures
Sort
View
104
Voted
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
78
Voted
SOUPS
2009
ACM
15 years 4 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
ICCV
2007
IEEE
15 years 3 months ago
Simultaneous Segmentation and 3D Reconstruction of Monocular Image Sequences
When trying to extract 3D scene information and camera motion from an image sequence alone, it is often necessary to cope with independently moving objects. Recent research has un...
Kemal Egemen Ozden, Konrad Schindler, Luc J. Van G...
ICRA
2007
IEEE
134views Robotics» more  ICRA 2007»
15 years 3 months ago
MRBUG: A Competitive Multi-Robot Path Finding Algorithm
— We explore an on-line problem where a group of robots has to reach a target whose position is known in an unknown planar environment whose geometry is acquired by the robots du...
Shahar Sarid, Amir Shapiro, Yoav Gabriely
ATAL
2007
Springer
15 years 3 months ago
The IEEE FIPA approach to integrating software agents and web services
In many settings Web services are now perceived as the first choice technology to provide neatly encapsulated functionality for Web-based computation. To date, many standards hav...
Dominic Greenwood, Margaret Lyell, Ashok U. Mallya...