Sciweavers

1064 search results - page 84 / 213
» Cryptography from Anonymity
Sort
View
130
Voted
IJCV
1998
101views more  IJCV 1998»
15 years 3 months ago
Synthesis of Novel Views from a Single Face Image
Images formed by a human face change with viewpoint. A new technique is described for synthesizing images of faces from new viewpoints, when only a single 2D image is available. A...
Thomas Vetter
136
Voted
CEAS
2004
Springer
15 years 9 months ago
Learning to Extract Signature and Reply Lines from Email
: We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessi...
Vitor Rocha de Carvalho, William W. Cohen
134
Voted
IJNSEC
2007
138views more  IJNSEC 2007»
15 years 3 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
15 years 2 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
183
Voted
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 3 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...