Sciweavers

330 search results - page 42 / 66
» Random Indexing Revisited
Sort
View
103
Voted
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 28 days ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
EUROCRYPT
2010
Springer
15 years 5 months ago
Universal One-Way Hash Functions via Inaccessible Entropy
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs, whi...
Iftach Haitner, Thomas Holenstein, Omer Reingold, ...
BMCBI
2008
71views more  BMCBI 2008»
15 years 14 days ago
A tale of two symmetrical tails: Structural and functional characteristics of palindromes in proteins
Background: It has been previously shown that palindromic sequences are frequently observed in proteins. However, our knowledge about their evolutionary origin and their possible ...
Armita Sheari, Mehdi Kargar, Ali Katanforoush, Sha...
137
Voted
PAMI
2007
185views more  PAMI 2007»
14 years 12 months ago
A Two-Level Generative Model for Cloth Representation and Shape from Shading
In this paper we present a two-level generative model for representing the images and surface depth maps of drapery and clothes. The upper level consists of a number of folds whic...
Feng Han, Song Chun Zhu
INFOCOM
2010
IEEE
14 years 10 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...