Sciweavers

319 search results - page 8 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
14 years 11 months ago
Oblivious Transfer from Weak Noisy Channels
Various results show that oblivious transfer can be implemented using the assumption of noisy channels. Unfortunately, this assumption is not as weak as one might think, because i...
Jürg Wullschleger
ASIACRYPT
2010
Springer
13 years 9 months ago
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
INFOCOM
2003
IEEE
14 years 4 months ago
Ad Hoc Positioning System (APS) Using AOA
— Position information of individual nodes is useful in implementing functions such as routing and querying in ad-hoc networks. Deriving position information by using the capabil...
Dragos Niculescu, B. R. Badrinath
CAGD
2000
53views more  CAGD 2000»
13 years 10 months ago
Multi-point tool positioning strategy for 5-axis mashining of sculptured surfaces
Multi-point machining (MPM) is a tool positioning technique used for finish machining of sculptured surfaces. In this technique the desired surface is generated at more than one p...
Andrew Warkentin, Fathy Ismail, Sanjeev Bedi
ICRA
2010
IEEE
112views Robotics» more  ICRA 2010»
13 years 9 months ago
On the solvability of the Mutual Localization problem with Anonymous Position Measures
— This paper formulates and investigates a novel problem called Mutual Localization with Anonymous Position Measures. This is an extension of Mutual Localization with Position Me...
Antonio Franchi, Giuseppe Oriolo, Paolo Stegagno