Sciweavers

972 search results - page 134 / 195
» presence 2007
Sort
View
ASIACRYPT
2007
Springer
14 years 4 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...
ATAL
2007
Springer
14 years 4 months ago
An advanced bidding agent for advertisement selection on public displays
In this paper we present an advanced bidding agent that participates in first-price sealed bid auctions to allocate advertising space on BluScreen – an experimental public adve...
Alex Rogers, Esther David, Terry R. Payne, Nichola...
ATAL
2007
Springer
14 years 4 months ago
Automatic annotation of team actions in observations of embodied agents
Recognizing and annotating the occurrence of team actions in observations of embodied agents has applications in surveillance and in training of military or sport teams. We descri...
Linus J. Luotsinen, Hans Fernlund, Ladislau Bö...
ATC
2007
Springer
14 years 4 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
CCS
2007
ACM
14 years 4 months ago
Universally composable and forward-secure RFID authentication and authenticated key exchange
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Tri Van Le, Mike Burmester, Breno de Medeiros