Sciweavers

763 search results - page 37 / 153
» Digital Signatures Today
Sort
View
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 25 days ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
HT
2007
ACM
13 years 11 months ago
A study of publisher, writer, and reader: different perspectives on digital fiction
This paper describes a study set up to investigate and map the landscape of digital writing today. Writers, readers and publishers have been interviewed and questioned for their o...
Hazel Wright, Daniela Petrelli
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
13 years 11 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
CN
2008
100views more  CN 2008»
13 years 7 months ago
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
In recent years, massively multiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games. In order to prevent c...
Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang
TRUSTBUS
2005
Springer
14 years 1 months ago
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
Abstract. Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. Most proxy signature schemes have succeeded for proxy delegations and t...
Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee