Sciweavers

10819 search results - page 269 / 2164
» Addition and multiplication of sets
Sort
View
ICASSP
2010
IEEE
15 years 27 days ago
Audio fingerprinting to identify multiple videos of an event
The proliferation of consumer recording devices and video sharing websites makes the possibility of having access to multiple recordings of the same occurrence increasingly likely...
Courtenay V. Cotton, Daniel P. W. Ellis
96
Voted
IJNSEC
2008
108views more  IJNSEC 2008»
15 years 21 days ago
Multiplicative Forward-Secure Threshold Signature Scheme
The devastating consequence of secret key exposure in digital signature is that any signature can be forged and cannot be trusted. To mitigate the damage of secret key exposure, f...
Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui,...
VISAPP
2007
15 years 1 months ago
Simultaneous robust fitting of multiple curves
In this paper, we address the problem of robustly recovering several instances of a curve model from a single noisy data set with outliers. Using M-estimators revisited in a Lagran...
Jean-Philippe Tarel, Pierre Charbonnier, Sio-Song ...
108
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Enabling Use of Single Password over Multiple Servers in Two-Server Model
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Yanjiang Yang, Feng Bao
LATINCRYPT
2010
14 years 11 months ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...