Sciweavers

195 search results - page 17 / 39
» E-voting - a Key to Independence for All
Sort
View
127
Voted
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
15 years 8 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
WIRI
2005
IEEE
15 years 7 months ago
A Fast Linkage Detection Scheme for Multi-Source Information Integration
Record linkage refers to techniques for identifying records associated with the same real-world entities. Record linkage is not only crucial in integrating multi-source databases ...
Akiko N. Aizawa, Keizo Oyama
EUROCRYPT
2004
Springer
15 years 5 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
CCS
2008
ACM
15 years 3 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
130
Voted
CVPR
2007
IEEE
16 years 3 months ago
Joint Optimization of Cascaded Classifiers for Computer Aided Detection
The existing methods for offline training of cascade classifiers take a greedy search to optimize individual classifiers in the cascade, leading inefficient overall performance. W...
Murat Dundar, Jinbo Bi