Sciweavers

189 search results - page 28 / 38
» Leakage-Resilient Zero Knowledge
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
Bayesian indoor positioning systems
— In this paper, we introduce a new approach to location estimation where, instead of locating a single client, we simultaneously locate a set of wireless clients. We present a B...
David Madigan, E. Einahrawy, R. P. Martin, Wen-Hua...
FOCS
2000
IEEE
14 years 2 months ago
Zaps and Their Applications
A zap is a two-round, public coin witness-indistinguishable protocol in which the first round, consisting of a message from the verifier to the prover, can be fixed “once and...
Cynthia Dwork, Moni Naor
ICIA
2007
14 years 5 days ago
Enhancing Interaction with To-Do Lists: Using Artificial Assistants
Assisting users with To Do lists presents new challenges for intelligent user interfaces. This paper presents our approach and an implemented system, BEAM, to process To Do list e...
Yolanda Gil, Timothy Chklovski
IJCAI
2001
13 years 11 months ago
Efficient Consequence Finding
We present an extensive experimental study of consequence-finding algorithms based on kernel resolution, using both a trie-based and a novel ZBDD-based implementation, which uses ...
Laurent Simon, Alvaro del Val
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 9 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu