Sciweavers

790 search results - page 23 / 158
» Designated Confirmer Signatures
Sort
View
ASIACRYPT
2001
Springer
14 years 6 days ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
DCC
2007
IEEE
14 years 7 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
ICIP
2003
IEEE
14 years 29 days ago
Joint source-channel coding scheme for image-in-image data hiding
We consider the problem of hiding images in images. In addition to the usual design constraints such as imperceptible host degradation and robustness in presence of variety of att...
Kaushal Solanki, Onkar Dabeer, B. S. Manjunath, Up...
ICASSP
2007
IEEE
13 years 11 months ago
Robust Matched Filters for Target Detection in Hyperspectral Imaging Data
Most detection algorithms for hyperspectral imaging applications assume a target with a perfectly known spectral signature. In practice, the target signature is either imperfectly...
Dimitris Manolakis, Ronald Lockwood, Thomas Cooley...
ICCAD
1998
IEEE
83views Hardware» more  ICCAD 1998»
13 years 12 months ago
Signature hiding techniques for FPGA intellectual property protection
John Lach, William H. Mangione-Smith, Miodrag Potk...