Sciweavers

3702 search results - page 61 / 741
» All Pairings Are in a Group
Sort
View
IEEEIAS
2009
IEEE
15 years 7 months ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
118
Voted
WINE
2007
Springer
182views Economy» more  WINE 2007»
15 years 6 months ago
Mechanism Design on Trust Networks
We introduce the concept of a trust network—a decentralized payment infrastructure in which payments are routed as IOUs between trusted entities. The trust network has directed ...
Arpita Ghosh, Mohammad Mahdian, Daniel M. Reeves, ...
82
Voted
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
15 years 6 months ago
Conversations in the Blogosphere: An Analysis "From the Bottom Up"
The "blogosphere" has been claimed to be a densely interconnected conversation, with bloggers linking to other bloggers, referring to them in their entries, and posting ...
Susan C. Herring, Inna Kouper, John C. Paolillo, L...
ICDCS
2005
IEEE
15 years 6 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake
122
Voted
SCN
2004
Springer
123views Communications» more  SCN 2004»
15 years 5 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros