Sciweavers

446 search results - page 77 / 90
» On Anonymity of Group Signatures
Sort
View
ISI
2006
Springer
14 years 11 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
ECCV
1998
Springer
16 years 1 months ago
Projective and Illumination Invariant Representation of Disjoint Shapes
We describe a new projectively invariant representation of disjoint contour groups which is suitable for shape-based retrieval from an image database. It consists of simultaneous ...
Sergei Startchik, Ruggero Milanese, Thierry Pun
ICASSP
2008
IEEE
15 years 6 months ago
Robust video fingerprints based on subspace embedding
We present a novel video fingerprinting method based on subspace embedding. The proposed method is particularly robust against frame-rate conversion attacks and geometric attacks...
Regunathan Radhakrishnan, Claus Bauer
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 4 months ago
Batch Groth-Sahai
Abstract. In 2008, Groth and Sahai proposed a general methodology for constructing non-interactive zeroknowledge (and witness-indistinguishable) proofs in bilinear groups. While av...
Olivier Blazy, Georg Fuchsbauer, Malika Izabach&eg...
ASIACRYPT
2000
Springer
15 years 4 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King