Sciweavers

138 search results - page 10 / 28
» A Proposal of Short Proxy Signature using Pairing
Sort
View
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
13 years 10 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
NBIS
2009
Springer
14 years 1 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
IJNSEC
2007
130views more  IJNSEC 2007»
13 years 6 months ago
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme
In 2004, Libert and Quisquater proposed an identity based undeniable signature scheme using pairings over elliptic curves. In this article, we show that the scheme is not secure. ...
Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-M...
ICCV
2011
IEEE
12 years 6 months ago
Basis constrained 3D scene flow on a dynamic proxy
Existing scene flow approaches mainly focus on twoframe stereo-pair configurations and reconstruct an imagebased representation of scene flow. Instead, we propose a variational...
Neil Birkbeck, Martin Jagersand, Dana Cobzas
MIR
2004
ACM
154views Multimedia» more  MIR 2004»
14 years 4 days ago
Fast and robust short video clip search using an index structure
In this paper, we present an index structure-based method to fast and robustly search short video clips in large video collections. First we temporally segment a given long video ...
Junsong Yuan, Ling-Yu Duan, Qi Tian, Changsheng Xu