Sciweavers

1610 search results - page 117 / 322
» Identity Based Multisignatures
Sort
View
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
15 years 8 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica
ICPPW
2003
IEEE
15 years 8 months ago
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evol...
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee
ICASSP
2011
IEEE
14 years 6 months ago
Hilbert envelope based features for robust speaker identification under reverberant mismatched conditions
It is well known that MFCC based speaker identification (SID) systems easily break down under mismatched training and test conditions. One such mismatch occurs when a SID system ...
Seyed Omid Sadjadi, John H. L. Hansen
ECCV
2002
Springer
16 years 5 months ago
Phase-Based Local Features
Abstract. We introduce a new type of local feature basedon the phaseand amplitude responsesof complex-valuedsteerable filters. The designof this local feature is motivated by a des...
Gustavo Carneiro, Allan D. Jepson
ICIP
2004
IEEE
16 years 4 months ago
Online face recognition system for videos based on modified probabilistic neural networks
Video retrieval in consumer applications demands high level semantic descriptors such as people's identity. The problem is that in a variety of videos such as home videos, Ho...
Jun Fan, Nevenka Dimitrova, Vasanth Philomin