Sciweavers

530 search results - page 39 / 106
» Practical Threshold Signatures
Sort
View
124
Voted
IJACT
2008
158views more  IJACT 2008»
15 years 14 days ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
15 years 5 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang
96
Voted
COMCOM
1999
73views more  COMCOM 1999»
15 years 4 days ago
Securing digital signatures for non-repudiation
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
Jianying Zhou, Kwok-Yan Lam
98
Voted
E2EMON
2006
IEEE
15 years 6 months ago
A Hybrid Approach for Accurate Application Traffic Identification
—The traffic dynamics of the Internet’s dominant applications, such as peer-to-peer and multimedia, worsen the accuracy of the existing application traffic identification. Ther...
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung...
82
Voted
ICCV
2003
IEEE
16 years 2 months ago
Robust Regression with Projection Based M-estimators
The robust regression techniques in the RANSAC family are popular today in computer vision, but their performance depends on a user supplied threshold. We eliminate this drawback ...
Haifeng Chen, Peter Meer