Sciweavers

3899 search results - page 14 / 780
» Robust Image Hashing
Sort
View
61
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Permutation grouping: intelligent Hash function design for audio & image retrieval
Shumeet Baluja, Michele Covell, Sergey Ioffe
ACSAC
2009
IEEE
15 years 7 months ago
A Study of User-Friendly Hash Comparison Schemes
—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans ...
Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassan...
124
Voted
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 7 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 5 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
94
Voted
FODO
1993
Springer
147views Algorithms» more  FODO 1993»
15 years 4 months ago
Design and Implementation of DDH: A Distributed Dynamic Hashing Algorithm
Abstract. DDH extends the idea of dynamic hashing algorithms to distributed systems. DDH spreads data across multiple servers in a network using a novel autonomous location discove...
Robert Devine