Sciweavers

6574 search results - page 49 / 1315
» Current Signatures: Application
Sort
View
PAMI
2007
110views more  PAMI 2007»
13 years 10 months ago
Toward Noncooperative Iris Recognition: A Classification Approach Using Multiple Signatures
—This paper focus on noncooperative iris recognition, i.e., the capture of iris images at large distances, under less controlled lighting conditions, and without active participa...
Hugo Proença, Luís A. Alexandre
ASIACRYPT
1992
Springer
14 years 2 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
ISPEC
2005
Springer
14 years 4 months ago
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
Abstract. A ring signature scheme can be viewed as a group signature scheme with no anonymity revocation and with simple group setup. A linkable ring signature (LRS) scheme additio...
Patrick P. Tsang, Victor K. Wei
JCM
2008
74views more  JCM 2008»
13 years 10 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...
ECCV
2008
Springer
15 years 19 days ago
Background Subtraction on Distributions
Environmental monitoring applications present a challenge to current background subtraction algorithms that analyze the temporal variability of pixel intensities, due to the comple...
Teresa Ko, Stefano Soatto, Deborah Estrin