Sciweavers

1610 search results - page 64 / 322
» Identity Based Multisignatures
Sort
View
CMS
2010
118views Communications» more  CMS 2010»
15 years 2 months ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
AUSAI
1999
Springer
15 years 6 months ago
Minimal Belief Change and Pareto-Optimality
This paper analyzes the notion of a minimal belief change that incorporates new information. I apply the fundamental decisiontheoretic principle of Pareto-optimality to derive a no...
Oliver Schulte
105
Voted
CCS
2009
ACM
16 years 2 months ago
A generic construction of useful client puzzles
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
15 years 8 months ago
Repudiation Detection in Handwritten Documents
The problems that arise in forensic document examination, are usually quite different from that of traditional writer identification and verification tasks, where the data is ass...
Sachin Gupta, Anoop M. Namboodiri
106
Voted
ISMIR
2005
Springer
182views Music» more  ISMIR 2005»
15 years 7 months ago
The Mel-Frequency Cepstral Coefficients in the Context of Singer Identification
The singing voice is the oldest and most complex musical instrument. A familiar singer’s voice is easily recognizable for humans, even when hearing a song for the first time. O...
Annamaria Mesaros, Jaakko Astola