Sciweavers

6574 search results - page 59 / 1315
» Current Signatures: Application
Sort
View
LATINCRYPT
2010
13 years 9 months ago
A Lattice-Based Threshold Ring Signature Scheme
In this article, we propose a new lattice-based threshold ring signature scheme, modifying Aguilar’s code-based solution to use the short integer solution (SIS) problem as securi...
Pierre-Louis Cayrel, Richard Lindner, Markus R&uum...
EUROPKI
2009
Springer
13 years 8 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis
DEXAW
2006
IEEE
140views Database» more  DEXAW 2006»
14 years 4 months ago
String-Matching and Update through Algebraic Signatures in Scalable Distributed Data Structures
: Scalable Distributed Data Structures (SDDSs) store large scalable files over a distributed RAM of nodes in a grid or a P2P network. The files scale transparently for the applicat...
Riad Mokadem, Witold Litwin
SIAMIS
2008
211views more  SIAMIS 2008»
13 years 10 months ago
Sparse and Redundant Modeling of Image Content Using an Image-Signature-Dictionary
Modeling signals by sparse and redundant representations has been drawing considerable attention in recent years. Coupled with the ability to train the dictionary using signal exam...
Michal Aharon, Michael Elad
ICASSP
2011
IEEE
13 years 2 months ago
Human gait parameter estimation based on micro-doppler signatures using particle filters
Monitoring and tracking human activities around restricted areas is an important issue in security and surveillance applications. The movement of different parts of the human body...
M. B. Guldogan, Fredrik Gustafsson, Umut Orguner, ...