Sciweavers

195 search results - page 17 / 39
» E-voting - a Key to Independence for All
Sort
View
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 2 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
WIRI
2005
IEEE
14 years 2 months ago
A Fast Linkage Detection Scheme for Multi-Source Information Integration
Record linkage refers to techniques for identifying records associated with the same real-world entities. Record linkage is not only crucial in integrating multi-source databases ...
Akiko N. Aizawa, Keizo Oyama
EUROCRYPT
2004
Springer
14 years 15 days ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
CCS
2008
ACM
13 years 10 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
CVPR
2007
IEEE
14 years 10 months ago
Joint Optimization of Cascaded Classifiers for Computer Aided Detection
The existing methods for offline training of cascade classifiers take a greedy search to optimize individual classifiers in the cascade, leading inefficient overall performance. W...
Murat Dundar, Jinbo Bi