Sciweavers

195 search results - page 14 / 39
» E-voting - a Key to Independence for All
Sort
View
JCS
2007
120views more  JCS 2007»
13 years 7 months ago
Dynamic types for authentication
We propose a type and effect system for authentication protocols built upon a tagging scheme that formalizes the intended semantics of ciphertexts. The main result is that the val...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
DISOPT
2008
89views more  DISOPT 2008»
13 years 7 months ago
Group sequencing around a common due date
The problem of scheduling groups of jobs on a single machine under the group technology assumption is studied. Jobs of the same group are processed contiguously and a sequence ind...
T. C. Edwin Cheng, Mikhail Y. Kovalyov, C. T. Ng, ...
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 8 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
ISBI
2004
IEEE
14 years 8 months ago
Model Based Symmetric Information Theoretic Large Deformation Multi-Modal Image Registration
This paper presents a Bayesian framework for generating inverse-consistent inter-subject large deformation transformations between two multi-modal image sets of the brain. In this...
Peter Lorenzen, Brad Davis, Sarang C. Joshi
SIGMOD
2003
ACM
144views Database» more  SIGMOD 2003»
14 years 7 months ago
A Multi-paradigm Querying Approach for a Generic Multimedia Database Management System
To truly meet the requirements of multimedia database (MMDB) management, an integrated framework for modeling, managing and retrieving various kinds of media data in a uniform way...
Ji-Rong Wen, Qing Li, Wei-Ying Ma, HongJiang Zhang