Sciweavers

6574 search results - page 51 / 1315
» Current Signatures: Application
Sort
View
COMSWARE
2007
IEEE
14 years 5 months ago
S-WOW: Signature based Wake-on-WLAN
Abstract— Long distance Wi-Fi links are cost effective alternative to provide internet and VoIP connectivity, in rural areas. In developing regions these low cost solutions have ...
Nilesh Mishra, Dhiraj Golcha, Akhilesh Bhadauria, ...
ISW
2004
Springer
14 years 4 months ago
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
In key-insulated cryptography, there are many private keys with different indexes and a single, fixed public key. When the trust model includes multiple Certification Authoritie...
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
VISAPP
2007
13 years 12 months ago
Fourier signature in log-polar images
Abstract. In image-based robot navigation, the robot localises itself by comparing images taken at its current position with a set of reference images stored in its memory. The pro...
A. Gasperin, Carmelo Ardito, Enrico Grisan, Emanue...
ICICS
2003
Springer
14 years 4 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr