Sciweavers

401 search results - page 19 / 81
» Delegatable Functional Signatures
Sort
View
CSFW
2005
IEEE
14 years 1 months ago
Deciding Knowledge in Security Protocols under (Many More) Equational Theories
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
Martín Abadi, Véronique Cortier
ETS
2010
IEEE
150views Hardware» more  ETS 2010»
13 years 6 months ago
Predicting dynamic specifications of ADCs with a low-quality digital input signal
— A new method is presented to test dynamic parameters of Analogue-to-Digital Converters (ADC). A noisy and nonlinear pulse is applied as the test stimulus, which is suitable for...
Xiaoqin Sheng, Vincent Kerzerho, Hans G. Kerkhoff
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 3 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
ICPR
2000
IEEE
14 years 8 months ago
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties
Research has been active in thefield offorgeiy detection, but relatively little work has been done on the detection of skilled forgeries. In thispaper, we present an algorithmfor ...
Jinhong Katherine Guo, David S. Doermann, Azriel R...
EMMCVPR
2005
Springer
14 years 1 months ago
One-Shot Integral Invariant Shape Priors for Variational Segmentation
Abstract. We match shapes, even under severe deformations, via a smooth reparametrization of their integral invariant signatures. These robust signatures and correspondences are th...
Siddharth Manay, Daniel Cremers, Anthony J. Yezzi,...