Sciweavers

162 search results - page 29 / 33
» A Group Signature Scheme from Lattice Assumptions
Sort
View
CLEF
2008
Springer
15 years 13 days ago
Medical Image Annotation in ImageCLEF 2008
Abstract. The ImageCLEF 2008 medical image annotation task is designed to assess the quality of content-based image retrieval and image classification by means of global signatures...
Thomas Deselaers, Thomas Martin Deserno
99
Voted
SIGGRAPH
1996
ACM
15 years 2 months ago
A Volumetric Method for Building Complex Models from Range Images
A number of techniques have been developed for reconstructing surfaces by integrating groups of aligned range images. A desirable set of properties for such algorithms includes: i...
Brian Curless, Marc Levoy
ICPADS
2005
IEEE
15 years 4 months ago
Separable and Anonymous Identity-Based Key Issuing
Abstract. In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is respo...
Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hu...
DCC
2000
IEEE
14 years 10 months ago
Discrete Logarithms: The Past and the Future
The first practical public key cryptosystem to be published, the Diffie-Hellman key exchange algorithm, was based on the assumption that discrete logarithms are hard to compute. T...
Andrew M. Odlyzko
SCN
2010
Springer
187views Communications» more  SCN 2010»
14 years 9 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...