Sciweavers

36 search results - page 6 / 8
» Lossy Trapdoor Functions and Their Applications
Sort
View
PROVSEC
2007
Springer
13 years 11 months ago
Decryptable Searchable Encryption
As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This pa...
Thomas Fuhr, Pascal Paillier
ISCAS
2006
IEEE
206views Hardware» more  ISCAS 2006»
13 years 11 months ago
JPEG2000 image coding system theory and applications
JPEG2000, the new standard for still image coding, Quantization, user defined wavelets, arbitrary wavelet provides a new framework and an integrated toolbox to better decomposition...
Athanassios N. Skodras, Touradj Ebrahimi
TIP
2002
102views more  TIP 2002»
13 years 4 months ago
Multilayered image representation: application to image compression
Abstract--The main contribution of this work is a new paradigm for image representation and image compression. We describe a new multilayered representation technique for images. A...
François G. Meyer, Amir Averbuch, Ronald R....
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
11 years 7 months ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy
CIMAGING
2009
184views Hardware» more  CIMAGING 2009»
13 years 6 months ago
Fast space-varying convolution and its application in stray light reduction
Space-varying convolution often arises in the modeling or restoration of images captured by optical imaging systems. For example, in applications such as microscopy or photography...
Jianing Wei, Guangzhi Cao, Charles A. Bouman, Jan ...