Sciweavers

2846 search results - page 9 / 570
» Not one click for security
Sort
View
IWAN
2004
Springer
15 years 8 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
IROS
2008
IEEE
167views Robotics» more  IROS 2008»
15 years 9 months ago
Active rough shape estimation of unknown objects
— This paper presents a method to determine the rough shape of an object. This is a step in the development of a ”One Click Grasping Tool”, a grasping tool of everyday-life o...
Claire Dune, Éric Marchand, Christophe Coll...
126
Voted
SOFSEM
2005
Springer
15 years 8 months ago
On the Security and Composability of the One Time Pad
Motivated by a potentially flawed deployment of the one time pad in a recent quantum cryptographic application securing a bank transfer [12], we show how to implement a statistica...
Dominik Raub, Rainer Steinwandt, Jörn Mü...
ASIACRYPT
2006
Springer
15 years 7 months ago
Analysis of One Popular Group Signature Scheme
The group signature scheme [1], ACJT for short, is popular. In this paper we show that it is not secure. It does not satisfy exculpability. The group manager can sign on behalf of ...
Zhengjun Cao
114
Voted
WWW
2008
ACM
16 years 4 months ago
Web user de-identification in personalization
It is a kind of privacy infraction in personalized web service if the user profile submitted to one web site transferred to another site without user permission. That can cause th...
Jiaqian Zheng, Jing Yao, Junyu Niu