Sciweavers

24132 search results - page 4813 / 4827
» and 2009
Sort
View
ASIACRYPT
2011
Springer
13 years 9 months ago
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
A fundamental question in cryptography deals with understanding the role that randomness plays in cryptographic protocols and to what extent it is necessary. One particular line o...
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, A...
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
CVPR
2009
IEEE
16 years 4 months ago
Multi-Camera Activity Correlation Analysis
We propose a novel approach for modelling correlations between activities in a busy public space captured by multiple non-overlapping and uncalibrated cameras. In our approach, ...
Chen Change Loy (Queen Mary, University of London)...
SMA
2009
ACM
132views Solid Modeling» more  SMA 2009»
15 years 4 months ago
Robust Voronoi-based curvature and feature estimation
Many algorithms for shape analysis and shape processing rely on accurate estimates of differential information such as normals and curvature. In most settings, however, care must...
Quentin Mérigot, Maks Ovsjanikov, Leonidas ...
MOBISYS
2009
ACM
15 years 10 months ago
Blue-Fi: enhancing Wi-Fi performance using bluetooth signals
Mobile devices are increasingly equipped with multiple network interfaces with complementary characteristics. In particular, the Wi-Fi interface has high throughput and transfer p...
Ganesh Ananthanarayanan, Ion Stoica
« Prev « First page 4813 / 4827 Last » Next »