Sciweavers

517 search results - page 10 / 104
» Adaptive Threshold Masking
Sort
View
ICICS
2010
Springer
13 years 5 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 27 days ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
ISM
2008
IEEE
161views Multimedia» more  ISM 2008»
14 years 1 months ago
Deblocking of Block-Transform Compressed Images Using Phase-Adaptive Shifted Thresholding
Many popular image compression schemes are based on block-transform coding, a technique where images are broken into small blocks of pixels prior to transformation and compression...
Alexander Wong, William Bishop
WWW
2005
ACM
14 years 8 months ago
Web log mining with adaptive support thresholds
With the fast increase in Web activities, Web data mining has recently become an important research topic. However, most previous studies of mining path traversal patterns are bas...
Jian Chih Ou, Chang-Hung Lee, Ming-Syan Chen
IJON
2007
79views more  IJON 2007»
13 years 7 months ago
Predicting neuronal activity with simple models of the threshold type: Adaptive Exponential Integrate-and-Fire model with two co
An adaptive Exponential Integrate-and-Fire (aEIF) model was used to predict the activity of layer-V-pyramidal neurons of rat neocortex under random current injection. A new protoc...
Claudia Clopath, Renaud Jolivet, Alexander Rauch, ...