Sciweavers

6574 search results - page 78 / 1315
» Current Signatures: Application
Sort
View
114
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 6 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
72
Voted
CAIP
2001
Springer
15 years 5 months ago
Implementation and Advanced Results on the Non-interrupted Skeletonization Algorithm
This paper is a continuation to the work in [1], in which a new algorithm for skeletonization is introduced. The algorithm given there and implemented for script and text is applie...
Khalid Saeed, Mariusz Rybnik, Marek Tabedzki
82
Voted
ISMIR
2001
Springer
117views Music» more  ISMIR 2001»
15 years 5 months ago
Score Processing For MIR
The focus of this paper is on the design and use of a music score representation. The structure of the representation is discussed and illustrated with sample algorithms, includin...
Donncha Ó. Maidín
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
15 years 5 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
88
Voted
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 23 days ago
Authorised Translations of Electronic Documents
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied a...
Jan Piechalski, Andreas U. Schmidt