Sciweavers

790 search results - page 46 / 158
» Hierarchical Group Signatures
Sort
View
108
Voted
ICIP
2001
IEEE
16 years 2 months ago
Extraction of rotation invariant signature based on fractal geometry
In this paper, a new method of feature extraction with rotation invariant property is presented. One of the main contributions of this study is that a rotation invariant signature...
Yu Tao, Thomas R. Ioerger, Yuan Yan Tang
CJ
2006
123views more  CJ 2006»
15 years 24 days ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
81
Voted
ICFP
2005
ACM
16 years 21 days ago
An expressive language of signatures
Current languages allow a programmer to describe an interface only by enumerating its parts, possibly including other interfaces wholesale. Such languages cannot express relations...
Norman Ramsey, Kathleen Fisher, Paul Govereau
ESORICS
2005
Springer
15 years 6 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
86
Voted
SCN
2008
Springer
126views Communications» more  SCN 2008»
15 years 20 days ago
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification
We consider the task of computing power productsQ 1ik gei i ("multi-exponentiation") where base elements g2, . . ., gk are fixed while g1 is variable between multi-expone...
Bodo Möller, Andy Rupp