Sciweavers

524 search results - page 2 / 105
» ets 2010
Sort
View
IJNSEC
2010
126views more  IJNSEC 2010»
12 years 12 months ago
Comment on Wu et al.'s Server-aided Verification Signature Schemes
In ProvSec 2008, Wu et al. constructed two server-aided verification signature (SAV-) schemes based on BLS signature. In this paper, we provide a new definition of the security of...
Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming ...
IJNSEC
2010
100views more  IJNSEC 2010»
12 years 12 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao
CORIA
2010
13 years 6 months ago
Impact de l'information visuelle pour la Recherche d'Images par le contenu et le contexte
Multimedia documents are increasingly used which involve to develop model to that kind of data. In this paper we present a multimedia model which combines textual and visual inform...
Christophe Moulin, Christine Largeron, Mathias G&e...
ET
2010
72views more  ET 2010»
12 years 12 months ago
Bandwidth Analysis of Functional Interconnects Used as Test Access Mechanism
Ardy van den Berg, Pengwei Ren, Erik Jan Marinisse...