Sciweavers

133 search results - page 17 / 27
» Fair Blind Signatures
Sort
View
TIFS
2008
179views more  TIFS 2008»
13 years 7 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
IEEEIAS
2009
IEEE
13 years 5 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
ESORICS
2005
Springer
14 years 1 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
ICPR
2002
IEEE
14 years 14 days ago
Extracting Fractal Features for Analyzing Protein Structure
This paper is concerned with the development of a computational methodology based on fractal geometry for determining 3D structure of protein with imagery projection operations. I...
Yu Tao, Thomas R. Ioerger, James C. Sacchettini
ICIP
2009
IEEE
14 years 8 months ago
Sparsity And Morphological Diversity For Hyperspectral Data Analysis
Recently morphological diversity and sparsity have emerged as new and effective sources of diversity for Blind Source Separation. Based on these new concepts, novel methods such a...