Sciweavers

763 search results - page 42 / 153
» Digital Signatures Today
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 1 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
14 years 25 days ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
ASIACRYPT
2006
Springer
13 years 11 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
SPIESR
1998
239views Database» more  SPIESR 1998»
13 years 9 months ago
Robust Embedded Data from Wavelet Coefficients
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using signature images that could be as much as 25% of the h...
Jong Jin Chae, B. S. Manjunath
CHI
2001
ACM
14 years 8 months ago
Partitioning digital worlds: focal and peripheral awareness in multiple monitor use
Software today does not help us partition our digital worlds effectively. We must organize them ourselves. This field study of users of multiple monitors examines how people with ...
Jonathan Grudin