—This paper focus on noncooperative iris recognition, i.e., the capture of iris images at large distances, under less controlled lighting conditions, and without active participa...
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and with simple group setup. A linkable ring signature (LRS) scheme additio...
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
Environmental monitoring applications present a challenge to current background subtraction algorithms that analyze the temporal variability of pixel intensities, due to the comple...