Sciweavers

311 search results - page 50 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
CCS
2007
ACM
14 years 1 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
P2P
2008
IEEE
14 years 1 months ago
Peer-to-Peer Secure Multi-party Numerical Computation
We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collabo...
Danny Bickson, Danny Dolev, Genia Bezman, Benny Pi...
OOPSLA
2007
Springer
14 years 1 months ago
Inferring aliasing and encapsulation properties for java
There are many proposals for language techniques to control aliasing and encapsulation in object oriented programs, typically based on notions of object ownership and pointer uniq...
Kin-Keung Ma, Jeffrey S. Foster
ICC
2009
IEEE
140views Communications» more  ICC 2009»
14 years 2 months ago
Joint Scheduling and Relay Selection in One- and Two-Way Relay Networks with Buffering
— In most wireless relay networks, the source and relay nodes transmit successively via fixed time division (FTD) and each relay forwards a packet immediately upon receiving. In...
Lianghui Ding, Meixia Tao, Fan Yang, Wenjun Zhang
ICRA
2008
IEEE
162views Robotics» more  ICRA 2008»
14 years 1 months ago
Vision-based estimation of slip angle for mobile robots and planetary rovers
— For a mobile robot it is critical to detect and compensate for slippage, especially when driving in rough terrain environments. Due to its highly unpredictable nature, drift la...
Giulio Reina, Genya Ishigami, Keiji Nagatani, Kazu...