Sciweavers

1573 search results - page 227 / 315
» Strong User Authentication
Sort
View
CCS
2004
ACM
15 years 5 months ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham
CRYPTO
2006
Springer
134views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
Round-Optimal Composable Blind Signatures in the Common Reference String Model
We build concurrently executable blind signatures schemes in the common reference string model, based on general complexity assumptions, and with optimal round complexity. Namely, ...
Marc Fischlin
BCSHCI
2008
15 years 3 months ago
Sharing vocabularies: tag usage in CiteULike
CiteULike is a collaborative tagging web site which lets users enter academic references into a database and describe these references using tags (categorizations of their own cho...
Sylvie Noël, Russell Beale
ECSCW
2007
15 years 3 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi
ECIR
2008
Springer
15 years 3 months ago
Video Corpus Annotation Using Active Learning
Concept indexing in multimedia libraries is very useful for users searching and browsing but it is a very challenging research problem as well. Beyond the systems' implementat...
Stéphane Ayache, Georges Quénot