Universidad Rey Juan Carlos

Displaying 1-4 of 4 results

  • White Papers // Feb 2011

    UpperWare: Bringing Resources Back to the System

    If someone expect the computer to vanish in the background, to make pervasive computing a reality, first they must be able to provide the illusion that all the user's computers, devices, and applications are part of a greater, virtual, computer. In order to build such a virtual computer, resources must...

    Provided By Universidad Rey Juan Carlos

  • White Papers // Aug 2010

    Visual Object Tracking in 3D With Color Based Particle Filter

    This paper addresses the problem of determining the current 3D location of a moving object and robustly tracking it from a sequence of camera images. The approach presented here uses a particle filter and does not perform any explicit triangulation. Only the color of the object to be tracked is...

    Provided By Universidad Rey Juan Carlos

  • White Papers // May 2009

    Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions

    Consider a scenario in which an adversary, attacking a certain public key encryption scheme, gains knowledge of several ciphertexts which underlying plaintext are meaningfully related with a given target ciphertext. This kind of related message attack has been proved successful against several public key encryption schemes; widely known is the...

    Provided By Universidad Rey Juan Carlos

  • White Papers // Feb 2009

    Combined (Identity-Based) Public Key Schemes

    Consider a scenario in which parties use a public key encryption scheme and a signature scheme with a single public key/private key pair - so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice,...

    Provided By Universidad Rey Juan Carlos

  • White Papers // Feb 2009

    Combined (Identity-Based) Public Key Schemes

    Consider a scenario in which parties use a public key encryption scheme and a signature scheme with a single public key/private key pair - so the private key sk is used for both signing and decrypting. Such a simultaneous use of a key is in general considered poor cryptographic practice,...

    Provided By Universidad Rey Juan Carlos

  • White Papers // Aug 2010

    Visual Object Tracking in 3D With Color Based Particle Filter

    This paper addresses the problem of determining the current 3D location of a moving object and robustly tracking it from a sequence of camera images. The approach presented here uses a particle filter and does not perform any explicit triangulation. Only the color of the object to be tracked is...

    Provided By Universidad Rey Juan Carlos

  • White Papers // Feb 2011

    UpperWare: Bringing Resources Back to the System

    If someone expect the computer to vanish in the background, to make pervasive computing a reality, first they must be able to provide the illusion that all the user's computers, devices, and applications are part of a greater, virtual, computer. In order to build such a virtual computer, resources must...

    Provided By Universidad Rey Juan Carlos

  • White Papers // May 2009

    Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions

    Consider a scenario in which an adversary, attacking a certain public key encryption scheme, gains knowledge of several ciphertexts which underlying plaintext are meaningfully related with a given target ciphertext. This kind of related message attack has been proved successful against several public key encryption schemes; widely known is the...

    Provided By Universidad Rey Juan Carlos