Sciweavers

14704 search results - page 2634 / 2941
» computing 2007
Sort
View
122
Voted
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
PCM
2007
Springer
160views Multimedia» more  PCM 2007»
15 years 10 months ago
3D Tracking of a Soccer Ball Using Two Synchronized Cameras
Abstract. We propose an adaptive method that can estimate 3D position of a soccer ball by using two viewpoint videos. The 3D position of a ball is essential to realize a 3D free vi...
Norihiro Ishii, Itaru Kitahara, Yoshinari Kameda, ...
151
Voted
PET
2007
Springer
15 years 10 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja
128
Voted
PKC
2007
Springer
109views Cryptology» more  PKC 2007»
15 years 10 months ago
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Abstract. In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosyst...
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wa...
150
Voted
POLICY
2007
Springer
15 years 10 months ago
Proteus: A Semantic Context-Aware Adaptive Policy Model
The growing diffusion of portable devices enables users to benefit from anytime and anywhere impromptu collaboration. Appropriate policy models that take into account the dynamici...
Alessandra Toninelli, Rebecca Montanari, Lalana Ka...
« Prev « First page 2634 / 2941 Last » Next »