Sciweavers

787 search results - page 151 / 158
» Subversion-Resilient Signature Schemes
Sort
View
GIS
2010
ACM
14 years 8 months ago
Verifying spatial queries using Voronoi neighbors
With the popularity of location-based services and the abundant usage of smart phones and GPS enabled devices, the necessity of outsourcing spatial data has grown rapidly over the...
Ling Hu, Wei-Shinn Ku, Spiridon Bakiras, Cyrus Sha...
ASIACRYPT
2010
Springer
14 years 7 months ago
Random Oracles with(out) Programmability
This paper investigates the Random Oracle Model (ROM) feature known as programmability, which allows security reductions in the ROM to dynamically choose the range points of an ide...
Marc Fischlin, Anja Lehmann, Thomas Ristenpart, Th...
86
Voted
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
14 years 7 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
CIBCB
2009
IEEE
14 years 7 months ago
Shape modeling and clustering of white matter fiber tracts using fourier descriptors
Reliable shape modeling and clustering of white matter fiber tracts is essential for clinical and anatomical studies that use diffusion tensor imaging (DTI) tractography techniques...
Xuwei Liang, Qi Zhuang, Ning Cao, Jun Zhang
74
Voted
IJACT
2010
67views more  IJACT 2010»
14 years 4 months ago
On message recognition protocols: recoverability and explicit confirmation
: We look at message recognition protocols (MRPs) and prove that there is a oneto-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we ...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson