Sciweavers

109 search results - page 13 / 22
» Identity Based Undeniable Signatures
Sort
View
125
Voted
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 4 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
15 years 10 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
BIRTHDAY
2012
Springer
14 years 2 days ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
MTA
2007
82views more  MTA 2007»
15 years 3 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
AVSS
2009
IEEE
15 years 9 months ago
Compact Signatures for 3D Face Recognition under Varying Expressions
We present a novel approach to 3D face recognition using compact face signatures based on automatically detected 3D landmarks. We represent the face geometry with inter-landmark d...
Fahad Daniyal, Prathap Nair, Andrea Cavallaro