Sciweavers

6574 search results - page 49 / 1315
» Current Signatures: Application
Sort
View
123
Voted
PAMI
2007
110views more  PAMI 2007»
15 years 5 days ago
Toward Noncooperative Iris Recognition: A Classification Approach Using Multiple Signatures
—This paper focus on noncooperative iris recognition, i.e., the capture of iris images at large distances, under less controlled lighting conditions, and without active participa...
Hugo Proença, Luís A. Alexandre
129
Voted
ASIACRYPT
1992
Springer
15 years 4 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
ISPEC
2005
Springer
15 years 6 months ago
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and with simple group setup. A linkable ring signature (LRS) scheme additio...
Patrick P. Tsang, Victor K. Wei
82
Voted
JCM
2008
74views more  JCM 2008»
15 years 20 days ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
ECCV
2008
Springer
16 years 2 months ago
Background Subtraction on Distributions
Environmental monitoring applications present a challenge to current background subtraction algorithms that analyze the temporal variability of pixel intensities, due to the comple...
Teresa Ko, Stefano Soatto, Deborah Estrin