Sciweavers

98 search results - page 14 / 20
» Undetachable Threshold Signatures
Sort
View
95
Voted
CIBCB
2009
IEEE
14 years 7 months ago
Shape modeling and clustering of white matter fiber tracts using fourier descriptors
Reliable shape modeling and clustering of white matter fiber tracts is essential for clinical and anatomical studies that use diffusion tensor imaging (DTI) tractography techniques...
Xuwei Liang, Qi Zhuang, Ning Cao, Jun Zhang
ESORICS
2009
Springer
15 years 10 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
88
Voted
NDSS
2003
IEEE
15 years 2 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
94
Voted
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
ICVGIP
2004
14 years 11 months ago
Content Based Image Retrieval with Multiresolution Salient Points
This paper presents a robust technique for Content Based Image Retrieval (CBIR) using salient points of an image. The salient points are extracted from different levels of the uns...
Minakshi Banerjee, Malay K. Kundu