Sciweavers

175 search results - page 32 / 35
» A Directed Signature Scheme Based on RSA Assumption
Sort
View
85
Voted
EUROCRYPT
2009
Springer
15 years 10 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
ASIACRYPT
2011
Springer
13 years 9 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
TWC
2008
147views more  TWC 2008»
14 years 9 months ago
On antijamming in general CDMA systems-part I: multiuser capacity analysis
Abstract--The capacity of a general multiuser CDMA jamming channel is analyzed when the receiver has or lacks jammer state information. Analyses are carried out for noncooperative ...
Reza Nikjah, Norman C. Beaulieu
ICCV
2003
IEEE
15 years 11 months ago
Learning Pedestrian Models for Silhouette Refinement
We present a model-based method for accurate extraction of pedestrian silhouettes from video sequences. Our approach is based on two assumptions, 1) there is a common appearance t...
L. Lee, Gerald Dalley, Kinh Tieu
CISS
2007
IEEE
15 years 3 months ago
Detecting Malicious Behavior in Cooperative Diversity
—We consider a cooperative diversity scheme where a relay cooperatively enhances communication between a source and destination. In cooperative diversity, due to lack of a mechan...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon