Sciweavers

369 search results - page 55 / 74
» Security Analysis of Several Group Signature Schemes
Sort
View
ICDAR
2007
IEEE
15 years 6 months ago
Curvelets Based Queries for CBIR Application in Handwriting Collections
This paper presents a new use of the Curvelet transform as a multiscale method for indexing linear singularities and curved handwritten shapes in documents images. As it belongs t...
Guillaume Joutel, Véronique Eglin, St&eacut...
LATINCRYPT
2010
14 years 10 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
TWC
2008
147views more  TWC 2008»
14 years 11 months ago
On antijamming in general CDMA systems-part I: multiuser capacity analysis
Abstract--The capacity of a general multiuser CDMA jamming channel is analyzed when the receiver has or lacks jammer state information. Analyses are carried out for noncooperative ...
Reza Nikjah, Norman C. Beaulieu
ADHOC
2008
132views more  ADHOC 2008»
14 years 12 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
15 years 5 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara