Sciweavers

247 search results - page 34 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
IVC
2002
192views more  IVC 2002»
13 years 7 months ago
Understanding visual behaviour
Modelling events is one of the key problems in dynamic scene analysis when salient and autonomous visual changes occuring in a scene need to be characterised effectively as meanin...
Shaogang Gong, Hilary Buxton
IDEAL
2010
Springer
13 years 5 months ago
Applying Clustering Techniques to Reduce Complexity in Automated Planning Domains
Automated Planning is a very active area of research within Artificial Intelligence. Broadly this discipline deals with the methods by which an agent can independently determine t...
Luke Dicken, John Levine
ASIACRYPT
2000
Springer
13 years 11 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
ICMAS
2000
13 years 8 months ago
Multiple Negotiations among Agents for a Distributed Meeting Scheduler
We present a method for multi-agent negotiation for implementing a distributed meeting scheduler. In the meeting scheduler, an agent negotiates with other agents about making an p...
Toramatsu Shintani, Takayuki Ito, Katia P. Sycara
SP
2010
IEEE
206views Security Privacy» more  SP 2010»
13 years 11 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters