Sciweavers

1871 search results - page 28 / 375
» The Ephemeral Pairing Problem
Sort
View
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
14 years 9 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 5 months ago
Using pair approximations to predict takeover dynamics in spatially structured populations
The topological properties of a network directly impact the flow of information through a system. For example, in natural populations, the network of inter-individual contacts aff...
Joshua L. Payne, Margaret J. Eppstein
NIME
2005
Springer
164views Music» more  NIME 2005»
15 years 4 months ago
Wireless Dance Control: PAIR and WISEAR
WISEAR (Wireless Sensor Array) is a Linux based Embeddedx86 TS- 5600 SBC (Single Board Computer) specifically configured for use with music, dance and video performance technologi...
Peter Swendsen, David Topper
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
15 years 1 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
CVPR
2006
IEEE
15 years 5 months ago
Cosegmentation of Image Pairs by Histogram Matching - Incorporating a Global Constraint into MRFs
We introduce the term cosegmentation which denotes the task of segmenting simultaneously the common parts of an image pair. A generative model for cosegmentation is presented. Inf...
Carsten Rother, Thomas P. Minka, Andrew Blake, Vla...