Sciweavers

ACIVS
2015
Springer
10 years 12 days ago
Ringing Artifact Suppression Using Sparse Representation
Abstract. The article refers to the problem of ringing artifact suppression. The ringing effect is caused by high-frequency information corruption or loss, it appears as waves or ...
Alexey V. Umnov, Andrey S. Krylov, Andrey V. Nason...
ACIVS
2015
Springer
10 years 12 days ago
Distance-Based Descriptors for Pedestrian Detection
In this paper, we propose an improvement of the detection approach that is based on the distance function. In the method, the distance values are computed inside the image to descr...
Radovan Fusek, Eduard Sojka
ACIVS
2015
Springer
10 years 12 days ago
Improvement of a Wavelet-Tensor Denoising Algorithm by Automatic Rank Estimation
This paper focuses on the denoising of multidimensional data by a tensor subspace-based method. In a seminal work, multiway Wiener filtering was developed to minimize the mean squ...
Julien Marot, Salah Bourennane
ACISP
2015
Springer
10 years 12 days ago
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes
Digital signatures are one of the most extensively used cryptographic primitives today. It is well-understood that they guarantee practical security only if the corresponding veri...
Felix Günther, Bertram Poettering
ACISP
2015
Springer
10 years 12 days ago
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
OAEP and other similar schemes proven secure in Random-Oracle Model require one or more hash functions with output size larger than those of standard hash functions. In this paper...
Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar ...
ACISP
2015
Springer
10 years 12 days ago
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazu...
ACISP
2015
Springer
10 years 12 days ago
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters
In this paper we propose a new approach to privately compute the set-union cardinality and the set-intersection cardinality among multiple honest-but-curious parties. Our approach ...
Rolf Egert, Marc Fischlin, David Gens, Sven Jacob,...
ACISP
2015
Springer
10 years 12 days ago
BP-XACML an Authorisation Policy Language for Business Processes
Abstract. XACML has become the defacto standard for enterprisewide, policy-based access control. It is a structured, extensible language that can express and enforce complex access...
Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim
ACISP
2015
Springer
10 years 12 days ago
Cryptanalysis of Reduced-Round Whirlwind
The Whirlwind hash function, which outputs a 512-bit digest, was designed by Barreto et al. and published by Design, Codes and Cryptography in 2010. In this paper, we provide a tho...
Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li