Sciweavers

195 search results - page 27 / 39
» Identity-Based Zero Knowledge
Sort
View
ROBOCUP
2001
Springer
98views Robotics» more  ROBOCUP 2001»
14 years 2 days ago
A Two-Tiered Approach to Self-Localization
Abstract. This paper describes a two-tiered approach to the self-localization problem for soccer playing robots using generic off-the-shelf color cameras. The solution consists of...
Frank de Jong, Jurjen Caarls, Robert Bartelds, Pie...
EUROCRYPT
2006
Springer
13 years 11 months ago
Compact Group Signatures Without Random Oracles
We present the first efficient group signature scheme that is provably secure without random oracles. We achieve this result by combining provably secure hierarchical signatures i...
Xavier Boyen, Brent Waters
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
14 years 1 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica
GLOBECOM
2008
IEEE
14 years 2 months ago
Transmitter-Based Minimization of Error Rates in the Downlink of Wireless Systems
—Using CDMA technology, one has to contend with interference in frequency-selective channels caused by multipath propagation and fading. Transmitter-based methods such as Zero Fo...
Fred Richter, Andreas Fischer, René Habendo...
MOBIMEDIA
2007
13 years 9 months ago
Implementation aspects of a delegation system
In this paper we simulate an authorization and delegation system using knowledge based technology. This proposal is part of a visual tool that is intended to be an implementation ...
Isaac Agudo, Javier Lopez, José A. Monteneg...