Sciweavers

897 search results - page 19 / 180
» Identity: How to name it, How to find it
Sort
View
ASIACRYPT
2007
Springer
14 years 2 months ago
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Spring...
Matthew Green, Susan Hohenberger
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 2 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
ISSA
2004
13 years 10 months ago
Using A Central Data Repository For Biometric Authentication In Passport Systems
Passports and visas are currently undergoing a rapid change due to legislation being passed by authorities such as the US requirement that they should have machine readable biomet...
Morné Breedt
DKE
2000
102views more  DKE 2000»
13 years 8 months ago
A Generic Framework for the Modeling of Contexts and its Applications
: Large information bases that are used by several different users and applications accommodate the demands of their users more effectively, if they can be split into possibly over...
Renate Motschnig-Pitrik
GEOS
2005
Springer
14 years 2 months ago
A Qualitative Trajectory Calculus and the Composition of Its Relations
Continuously moving objects are prevalent in many domains. Although there have been attempts to combine both spatial and temporal relationships from a reasoning, a database, as wel...
Nico Van de Weghe, Bart Kuijpers, Peter Bogaert, P...