Sciweavers

157 search results - page 23 / 32
» Universally Composable Signcryption
Sort
View
IROS
2007
IEEE
114views Robotics» more  IROS 2007»
14 years 1 months ago
Design and control of a second-generation hyper-redundant mechanism
— We present a refined, second-generation design, construction and integration, of a compact hyper-redundant snakelike robot, called “Woodstock.” This robot has substantial a...
H. Ben Brown, Michael Schwerin, Elie A. Shammas, H...
CCS
2007
ACM
14 years 1 months ago
Chosen-ciphertext secure proxy re-encryption
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a di...
Ran Canetti, Susan Hohenberger
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
14 years 1 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai
ERCIMDL
2001
Springer
171views Education» more  ERCIMDL 2001»
14 years 4 days ago
MARIAN: Flexible Interoperability for Federated Digital Libraries
Federated digital libraries are composed of distributed, autonomous, and often heterogeneous information services but provide users with a transparent, integrated view of collected...
Marcos André Gonçalves, Robert K. Fr...