Sciweavers

2681 search results - page 158 / 537
» Problem F
Sort
View
CCS
2007
ACM
14 years 2 months ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...
BMVC
2002
14 years 24 days ago
Modelling Facial Behaviours
We consider the problem of learning how a person's face behaves in a long video sequence, with the aim of synthesising convincing sequences demonstrating the same behaviours....
Franck Bettinger, Timothy F. Cootes, Christopher J...
AMDO
2008
Springer
14 years 12 days ago
Autonomous Virtual Agents for Performance Evaluation of Tracking Algorithms
This paper describes a framework which exploits the use of computer animation to evaluate the performance of tracking algorithms. This can be achieved in two different, complementa...
Pau Baiget, F. Xavier Roca, Jordi Gonzàlez
ASIACRYPT
2008
Springer
14 years 12 days ago
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the...
Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tart...
COCO
2008
Springer
79views Algorithms» more  COCO 2008»
14 years 6 days ago
Towards Dimension Expanders over Finite Fields
In this paper we study the problem of explicitly constructing a dimension expander raised by [BISW04]: Let Fn be the n dimensional linear space over the field F. Find a small (ide...
Zeev Dvir, Amir Shpilka