Sciweavers

74 search results - page 8 / 15
» Fully Leakage-Resilient Signatures
Sort
View
SCN
2004
Springer
123views Communications» more  SCN 2004»
15 years 3 months ago
On the Key Exposure Problem in Chameleon Hashes
Chameleon signatures were introduced by Krawczyk and Rabin, being non-interactive signature schemes that provide non-transferability. However, that first construction employs a c...
Giuseppe Ateniese, Breno de Medeiros
MM
2003
ACM
132views Multimedia» more  MM 2003»
15 years 3 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
BMCBI
2010
94views more  BMCBI 2010»
14 years 10 months ago
A high-throughput pipeline for the design of real-time PCR signatures
Background: Pathogen diagnostic assays based on polymerase chain reaction (PCR) technology provide high sensitivity and specificity. However, the design of these diagnostic assays...
Ravi Vijaya Satya, Kamal Kumar, Nela Zavaljevski, ...
ICASSP
2011
IEEE
14 years 1 months ago
Robust hyperspectral signal unmixing in the presence of correlated noise
Hyperspectral imaging analysis aims at the estimation of the number of constituent substances, known as endmembers, their spectral signatures as well as their abundance fractions ...
Masoud Farzam, Soosan Beheshti
IPCCC
2005
IEEE
15 years 3 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi