Sciweavers

1628 search results - page 126 / 326
» Compiler Construction Using Scheme
Sort
View
JCST
2008
120views more  JCST 2008»
15 years 2 months ago
Generic Transformation from Weakly to Strongly Unforgeable Signatures
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed...
Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao
163
Voted
PODC
2003
ACM
15 years 7 months ago
Scalable public-key tracing and revoking
Traitor Tracing Schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, each decryption key is...
Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti...
104
Voted
ICMCS
1998
IEEE
82views Multimedia» more  ICMCS 1998»
15 years 6 months ago
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
Various digital watermarking techniques have been proposed in recent years as the methods to protect the copyright of multimedia data. However, as pointed out by the IBM research ...
Lintian Qiao, Klara Nahrstedt
ISMAR
2006
IEEE
15 years 8 months ago
Augmented reality as a comparison tool in automotive industry
Augmented reality (AR) can be used in the automotive industry to compare real parts of a car with their associated construction data. The real parts have to be checked whether the...
Stefan Nölle, Gudrun Klinker
105
Voted
IPCCC
2005
IEEE
15 years 8 months ago
Performance comparison of multiplexing techniques for MPEG-4 object-based content
A study of the performance of a number of different multiplexing schemes was conducted in the context of streaming of MPEG-4 object-based content, with particular emphasis on stre...
Seán Murphy, Stefan Goor, Liam Murphy