Sciweavers

359 search results - page 63 / 72
» On Complete Primitives for Fairness
Sort
View
CCS
2009
ACM
14 years 2 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
SEMCO
2009
IEEE
14 years 2 months ago
An Algebraic Language for Semantic Data Integration on the Hidden Web
Semantic integration in the hidden Web is an emerging area of research where traditional assumptions do not always hold. Frequent changes, conflicts and the sheer size of the hid...
Shazzad Hosain, Hasan M. Jamil
IROS
2009
IEEE
161views Robotics» more  IROS 2009»
14 years 2 months ago
Accurate shape-based 6-DoF pose estimation of single-colored objects
— The problem of accurate 6-DoF pose estimation of 3D objects based on their shape has so far been solved only for specific object geometries. Edge-based recognition and trackin...
Pedram Azad, Tamim Asfour, Rüdiger Dillmann
ASIACRYPT
2009
Springer
14 years 2 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 1 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs