Sciweavers

119 search results - page 22 / 24
» New Colored Visual Secret Sharing Schemes
Sort
View
VISUALIZATION
1999
IEEE
13 years 11 months ago
Splatting Without the Blur
Splatting is a volume rendering algorithm that combines efficient volume projection with a sparse data representation: Only voxels that have values inside the iso-range need to be...
Klaus Mueller, Torsten Möller, Roger Crawfis
STOC
2005
ACM
150views Algorithms» more  STOC 2005»
14 years 7 months ago
Correcting errors without leaking partial information
This paper explores what kinds of information two parties must communicate in order to correct errors which occur in a shared secret string W. Any bits they communicate must leak ...
Yevgeniy Dodis, Adam Smith
SACRYPT
2005
Springer
189views Cryptology» more  SACRYPT 2005»
14 years 29 days ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the ta...
David Molnar, Andrea Soppera, David Wagner
TOG
2010
87views more  TOG 2010»
13 years 2 months ago
Optimizing continuity in multiscale imagery
Multiscale imagery often combines several sources with differing appearance. For instance, Internet-based maps contain satellite and aerial photography. Zooming within these maps ...
Charles Han, Hugues Hoppe
INFOCOM
2010
IEEE
13 years 6 months ago
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this para...
Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou