Sciweavers

262 search results - page 31 / 53
» Proposal of a Signature Scheme Based on STS Trapdoor
Sort
View
108
Voted
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
15 years 1 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
174
Voted
ICDE
2004
IEEE
120views Database» more  ICDE 2004»
15 years 11 months ago
Algebraic Signatures for Scalable Distributed Data Structures
Signatures detect changes to the data objects. Numerous schemes a known, e.g., the popular hash based SHA-1 standard. We propose a nov scheme we call algebraic signatures. We use ...
Witold Litwin, Thomas J. E. Schwarz
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
15 years 3 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
85
Voted
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
15 years 1 months ago
Fractal Transform Based Large Digital Watermark Embedding and Robust Full Blind Extraction
The aim of this demonstration is to present the ongoing performance of our R. and D. watermarking scheme software. The proposed illustrations cover a large panel of original image...
Jean-Luc Dugelay, S. Roche
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 3 months ago
Non-Orthogonal Transmission and Noncoherent Fusion of Censored Decisions
— In this paper, we propose a novel signaling scheme and corresponding noncoherent fusion rules for wireless sensor networks. In the proposed scheme, sensors transmit censored de...
Simon Yiu, Robert Schober