Sciweavers

199 search results - page 37 / 40
» Adaptive Proofs of Knowledge in the Random Oracle Model
Sort
View
157
Voted
PKC
2009
Springer
172views Cryptology» more  PKC 2009»
16 years 4 months ago
CCA-Secure Proxy Re-encryption without Pairings
ded abstract of this paper appears in PKC 2009, S. Jarecki, G. Tsudik (Eds.), volume 5443 of LNCS, pp. 357-376, Sringer-Verlag, 2009. CCA-Secure Proxy Re-Encryption without Pairing...
Jun Shao, Zhenfu Cao
126
Voted
CVPR
2007
IEEE
16 years 5 months ago
OPTIMOL: automatic Online Picture collecTion via Incremental MOdel Learning
A well-built dataset is a necessary starting point for advanced computer vision research. It plays a crucial role in evaluation and provides a continuous challenge to stateof-the-...
Li-Jia Li, Gang Wang, Fei-Fei Li 0002
135
Voted
SODA
1998
ACM
99views Algorithms» more  SODA 1998»
15 years 5 months ago
Online Throughput-Competitive Algorithm for Multicast Routing and Admission Control
We present the first polylog-competitive online algorithm for the general multicast admission control and routing problem in the throughput model. The ratio of the number of reque...
Ashish Goel, Monika Rauch Henzinger, Serge A. Plot...
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 4 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
108
Voted
EUROCRYPT
2001
Springer
15 years 8 months ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold