Sciweavers

1804 search results - page 8 / 361
» On set systems with a threshold property
Sort
View
79
Voted
ICIP
2005
IEEE
16 years 1 months ago
Generalized optimal thresholding for biometric key generation using face images
1 In this paper, we study biometric key generation using face images. Given a face image, a set of biometric features are extracted. Each feature is compared with a threshold to ge...
Wende Zhang, Tsuhan Chen
104
Voted
EDBT
2009
ACM
207views Database» more  EDBT 2009»
15 years 3 months ago
Evaluating probability threshold k-nearest-neighbor queries over uncertain data
In emerging applications such as location-based services, sensor monitoring and biological management systems, the values of the database items are naturally imprecise. For these ...
Reynold Cheng, Lei Chen 0002, Jinchuan Chen, Xike ...
ASIACRYPT
2001
Springer
15 years 4 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
IACR
2011
196views more  IACR 2011»
13 years 11 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
ICMCS
2009
IEEE
130views Multimedia» more  ICMCS 2009»
14 years 9 months ago
On improving the collision property of robust hashing based on projections
In this paper, we study the collision property of one of the robust hash functions proposed in [1]. This method was originally proposed for robust hash generation from blocks of i...
Regunathan Radhakrishnan, Wenyu Jiang, Claus Bauer