Sciweavers

44 search results - page 8 / 9
» Additive Proofs of Knowledge - A New Notion for Non-Interact...
Sort
View
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 5 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
IEEESCC
2006
IEEE
14 years 1 months ago
Ontology Reconciliation for Service-Oriented Computing
Service-oriented computing (SOC) is viewed as the computing paradigm of the near future, allowing for the dynamic interaction of services provided by distributed business partners...
Jingshan Huang, Jiangbo Dang, Michael N. Huhns
SP
2000
IEEE
13 years 12 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
SIGCSE
2008
ACM
140views Education» more  SIGCSE 2008»
13 years 7 months ago
Using iPodLinux in an introductory OS course
This paper describes a proof of concept for introducing iPods and iPodLinux into a one-semester introductory undergraduate operating systems course. iPodLinux is a version of the ...
Barry Lawson, Lewis Barnett