This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the mos...
We construct a simple public-key encryption scheme that supports polynomially many additions and one multiplication, similar to the cryptosystem of Boneh, Goh, and Nissim (BGN). S...
In this paper we consider the security of block ciphers which contain alternate layers of invertible S-boxes and affine mappings (there are many popular cryptosystems which use thi...
Abstract. The problem of proving a number is of a given arithmetic format with some prime elements, is raised in RSA undeniable signature, group signature and many other cryptograp...