Sciweavers

178 search results - page 19 / 36
» Analysis of One Popular Group Signature Scheme
Sort
View
EUROCRYPT
2001
Springer
15 years 4 months ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
MUE
2007
IEEE
129views Multimedia» more  MUE 2007»
15 years 6 months ago
Analysis of Sound Features for Music Timbre Recognition
Recently, communication, digital music creation, and computer storage technology has led to the dynamic increasing of online music repositories in both number and size, where auto...
Xin Zhang, Zbigniew W. Ras
ICC
2009
IEEE
127views Communications» more  ICC 2009»
15 years 6 months ago
Utility-Based User Grouping and Bandwidth Allocation for Wireless Multicast Systems
Abstract—With the proliferation of wireless multimedia applications, multicast/broadcast has been recognized as an efficient technique to transmit a large volume of data to mult...
Juan Liu, Wei Chen, Zhigang Cao, Ying Jun Zhang, S...
KAIS
2007
75views more  KAIS 2007»
14 years 11 months ago
Non-redundant data clustering
Data clustering is a popular approach for automatically finding classes, concepts, or groups of patterns. In practice this discovery process should avoid redundancies with existi...
David Gondek, Thomas Hofmann
BROADNETS
2005
IEEE
15 years 5 months ago
Privacy enhanced access control in pervasive computing environments
Abstract— Privacy and security are two important but seemingly contradict objectives in pervasive computing environments (PCEs). On the one hand, service providers want to authen...
Kui Ren, Wenjing Lou