Sciweavers

281 search results - page 48 / 57
» A New RSA-Based Signature Scheme
Sort
View
ICIP
2005
IEEE
15 years 20 days ago
Localization and security enhancement of block-based image authentication
Most block-based image authentication techniques that are presented in the literature sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting att...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
ICIP
1997
IEEE
15 years 16 days ago
SVD and log-log frequency sampling with Gabor kernels for invariant pictorial recognition
This paper presents an e cient scheme for a neinvariant object recognition. A ne invariance is obtained by a representation which is based on a new sampling con guration in the fr...
Zhiqian Wang, Jezekiel Ben-Arie
DAC
2001
ACM
14 years 12 months ago
Publicly Detectable Techniques for the Protection of Virtual Components
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
Gang Qu
PROVSEC
2007
Springer
14 years 5 months ago
Stronger Security of Authenticated Key Exchange
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We observe that there are several families of attacks on AKE protocols that lie outsid...
Brian A. LaMacchia, Kristin Lauter, Anton Mityagin
ASIACRYPT
2003
Springer
14 years 2 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang