Sciweavers

47 search results - page 8 / 10
» Limited Verifier Signature from Bilinear Pairings
Sort
View
LPAR
2007
Springer
15 years 4 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
102
Voted
IJNSEC
2007
164views more  IJNSEC 2007»
14 years 10 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
104
Voted
BIB
2007
59views more  BIB 2007»
14 years 10 months ago
Statistically designing microarrays and microarray experiments to enhance sensitivity and specificity
Gene expression signatures from microarray experiments promise to provide important prognostic tools for predicting disease outcome or response to treatment. A number of microarra...
Jason C. Hsu, Jane Chang, Tao Wang, Eiríkur...
101
Voted
ICBA
2004
Springer
144views Biometrics» more  ICBA 2004»
15 years 3 months ago
Improving Iris Recognition Accuracy via Cascaded Classifiers
As a reliable approach to human identification, iris recognition has received increasing attention in recent years. In the literature of iris recognition, local feature of image de...
Zhenan Sun, Yunhong Wang, Tieniu Tan, Jiali Cui
101
Voted
ISCI
2010
146views more  ISCI 2010»
14 years 7 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...