Sciweavers

507 search results - page 41 / 102
» The XTR Public Key System
Sort
View
106
Voted
MATES
2010
Springer
14 years 11 months ago
Impact of Competition on Quality of Service in Demand Responsive Transit
Abstract. Demand responsive transportation has the potential to provide efficient public door-to-door transport with a high quality. In currently implemented systems in the Netherl...
Ferdi Grootenboers, Mathijs de Weerdt, Mahdi Zarga...
139
Voted
TOG
2012
253views Communications» more  TOG 2012»
13 years 3 months ago
Exploring collections of 3D models using fuzzy correspondences
Large collections of 3D models from the same object class (e.g., chairs, cars, animals) are now commonly available via many public repositories, but exploring the range of shape v...
Vladimir G. Kim, Wilmot Li, Niloy J. Mitra, Stephe...
127
Voted
IDTRUST
2009
ACM
15 years 7 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
70
Voted
SAMOS
2007
Springer
15 years 7 months ago
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications
—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together ...
Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart P...
TCC
2005
Springer
132views Cryptology» more  TCC 2005»
15 years 6 months ago
Evaluating 2-DNF Formulas on Ciphertexts
Let ψ be a 2-DNF formula on boolean variables x1, . . . , xn ∈ {0, 1}. We present a homomorphic public key encryption scheme that allows the public evaluation of ψ given an en...
Dan Boneh, Eu-Jin Goh, Kobbi Nissim