Sciweavers

769 search results - page 103 / 154
» Where Is the Proof
Sort
View
EUROCRYPT
2004
Springer
14 years 2 months ago
Practical Large-Scale Distributed Key Generation
Generating a distributed key, where a constant fraction of the players can reconstruct the key, is an essential component of many largescale distributed computing tasks such as ful...
John F. Canny, Stephen Sorkin
INDOCRYPT
2004
Springer
14 years 2 months ago
Exact Analysis of Montgomery Multiplication
The Montgomery multiplication is often used for an efficient implementations of public-key cryptosystems. This algorithm occasionally needs an extra subtraction in the final step,...
Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
JCDCG
2004
Springer
14 years 2 months ago
Single-Vertex Origami and Spherical Expansive Motions
We prove that all single-vertex origami shapes are reachable from the open flat state via simple, non-crossing motions. We also consider conical paper, where the total sum of the ...
Ileana Streinu, Walter Whiteley
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 2 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
PCM
2004
Springer
171views Multimedia» more  PCM 2004»
14 years 2 months ago
SketchIt: Basketball Video Retrieval Using Ball Motion Similarity
Abstract. A prototype basketball video retrieval system is presented in this report. Retrieval is based on the similarity of ball motion in the clip with that in the query. The sys...
Sitaram Bhagavathy, Motaz A. El Saban