Sciweavers

1610 search results - page 59 / 322
» Identity Based Multisignatures
Sort
View
119
Voted
ASIACRYPT
2006
Springer
15 years 5 months ago
HIBE With Short Public Parameters Without Random Oracle
Abstract. At Eurocrypt 2005, Waters presented an identity based encryption (IBE) protocol which is secure in the full model without random oracle. In this paper, we extend Waters&#...
Sanjit Chatterjee, Palash Sarkar
ICASSP
2011
IEEE
14 years 5 months ago
Automatic Language Identification in music videos with low level audio and visual features
Automatic Language Identification (LID) in music has received significantly less attention than LID in speech. Here, we study the problem of LID in music videos uploaded on YouT...
Vijay Chandrasekhar, Mehmet Emre Sargin, David A. ...
127
Voted
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 8 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...
SPEAKERC
2007
Springer
126views Biometrics» more  SPEAKERC 2007»
15 years 8 months ago
Frame Based Features
In this chapter we will discuss feature extraction methods for speaker classification. We introduce linear predictive coding, mel frequency cepstral coefficients and wavelets and ...
Stefan Schacht, Jacques C. Koreman, Christoph Laue...
100
Voted
ACNS
2005
Springer
85views Cryptology» more  ACNS 2005»
15 years 7 months ago
New Signature Schemes with Coupons and Tight Reduction
Amongst provably secure signature schemes, two distinct classes are of particular interest: the ones with tight reduction (e.g., RSA-PSS), and those which support the use of coupon...
Benoît Chevallier-Mames