Sciweavers

152 search results - page 17 / 31
» On Signatures of Knowledge
Sort
View
CCS
2006
ACM
15 years 8 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
ICIP
2005
IEEE
15 years 10 months ago
Towards pose invariant gait reconstruction
Recently, a lot of research has been conducted into the usefulness of gait for identification at a distance. Since the gait of a person is readily identified when extracted from...
Nick Spencer, John Carter
147
Voted
ISSRE
2010
IEEE
15 years 3 months ago
Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test
—Large scale systems (LSS) contain multiple subsystems that interact across multiple nodes in sometimes unforeseen and complicated ways. As a result, pinpointing the subsystems t...
Haroon Malik, Bram Adams, Ahmed E. Hassan
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 11 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 10 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...