Sciweavers

4795 search results - page 756 / 959
» The Message Classification Model
Sort
View
127
Voted
ADHOCNOW
2005
Springer
15 years 8 months ago
Location Tracking in Mobile Ad Hoc Networks Using Particle Filters
Mobile ad hoc networks (MANET) are dynamic networks formed on-the-fly as mobile nodes move in and out of each others’ transmission ranges. In general, the mobile ad hoc networki...
Rui Huang, Gergely V. Záruba
107
Voted
ASIACRYPT
2005
Springer
15 years 8 months ago
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Abstract. We give improved upper bounds on the communication complexity of optimally-resilient secure multiparty computation in the cryptographic model. We consider evaluating an n...
Martin Hirt, Jesper Buus Nielsen
95
Voted
CEAS
2005
Springer
15 years 8 months ago
Implicit Queries for Email
Implicit query systems examine a document and automatically conduct searches for the most relevant information. In this paper, we offer three contributions to implicit query resea...
Joshua Goodman, Vitor R. Carvalho
128
Voted
EUROCRYPT
2005
Springer
15 years 8 months ago
Fuzzy Identity-Based Encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. ...
Amit Sahai, Brent Waters
115
Voted
EUROPKI
2005
Springer
15 years 8 months ago
Legal Security for Transformations of Signed Documents: Fundamental Concepts
Abstract. Transformations of signed documents raise questions of technical and organisational nature which render the legal security of the transformed document doubtful. In partic...
Andreas U. Schmidt, Zbynek Loebl