Sciweavers

495 search results - page 49 / 99
» Signed quorum systems
Sort
View
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
15 years 5 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 5 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
MOBISYS
2007
ACM
15 years 2 months ago
Automatic administration of the get up and go test
In-home monitoring using sensors has the potential to improve the life of elderly and chronically ill persons, assist their family and friends in supervising their status, and pro...
Dounia Berrada, Mario Romero, Gregory D. Abowd, Ma...
GRAPHICSINTERFACE
2009
14 years 9 months ago
Sketch-based path design
We present Drive, a system for the conceptual layout of 3D path networks. Our sketch-based interface allows users to efficiently author path layouts with minimal instruction. Our ...
James McCrae, Karan Singh
MOBICOM
2009
ACM
15 years 6 months ago
A quorum-based framework for establishing control channels in dynamic spectrum access networks
Establishing a control channel for medium access control is a challenging problem in multi-channel and dynamic spectrum access (DSA) networks. In the design of multi-channel MAC p...
Kaigui Bian, Jung Min Park, Ruiliang Chen