Sciweavers

2601 search results - page 339 / 521
» Secure Rewarding Schemes
Sort
View
ISI
2005
Springer
15 years 10 months ago
Selective Fusion for Speaker Verification in Surveillance
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
Yosef A. Solewicz, Moshe Koppel
DEXAW
2003
IEEE
128views Database» more  DEXAW 2003»
15 years 9 months ago
Current Mobile Payment Procedures on the German Market from the View of Customer Requirements
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the mos...
Key Pousttchi, Mario Zenker
112
Voted
EUROCRYPT
2010
Springer
15 years 9 months ago
A Simple BGN-Type Cryptosystem from LWE
We construct a simple public-key encryption scheme that supports polynomially many additions and one multiplication, similar to the cryptosystem of Boneh, Goh, and Nissim (BGN). S...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
EUROCRYPT
2001
Springer
15 years 9 months ago
Structural Cryptanalysis of SASAS
In this paper we consider the security of block ciphers which contain alternate layers of invertible S-boxes and affine mappings (there are many popular cryptosystems which use thi...
Alex Biryukov, Adi Shamir
ASIACRYPT
1999
Springer
15 years 8 months ago
How to Prove That a Committed Number Is Prime
Abstract. The problem of proving a number is of a given arithmetic format with some prime elements, is raised in RSA undeniable signature, group signature and many other cryptograp...
Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan