Sciweavers

1302 search results - page 23 / 261
» Soundness in the Public-Key Model
Sort
View
IJON
2000
82views more  IJON 2000»
15 years 1 months ago
Auditory localization using direction-dependent spectral information
This work presents a biologically motivated neuronal model for detecting the elevation of unfamiliar natural sound sources using monoaural cues, based on head-related-transfer fun...
Daniel Gill, Lidror Troyansky, Israel Nelken
SP
2002
IEEE
122views Security Privacy» more  SP 2002»
15 years 1 months ago
The UNICORE Grid infrastructure
UNICORE (Uniform Interface to Computer Resources) is a software infrastructure supporting seamless and secure access to distributed resources. UNICORE allows uniform access to dif...
Mathilde Romberg
TCC
2007
Springer
91views Cryptology» more  TCC 2007»
15 years 8 months ago
Lower Bounds for Non-interactive Zero-Knowledge
Abstract. We establish new lower bounds and impossibility results for noninteractive zero-knowledge proofs and arguments with set-up assumptions. – For the common random string m...
Hoeteck Wee
SUTC
2006
IEEE
15 years 8 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
123
Voted
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 8 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai