Sciweavers

625 search results - page 105 / 125
» Generalized Ring Signatures
Sort
View
CGF
2008
144views more  CGF 2008»
13 years 7 months ago
Global Intrinsic Symmetries of Shapes
Although considerable attention in recent years has been given to the problem of symmetry detection in general shapes, few methods have been developed that aim to detect and quant...
Maks Ovsjanikov, Jian Sun, Leonidas J. Guibas
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 7 months ago
Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying...
Ming-Shing Hsieh
ENTCS
2006
115views more  ENTCS 2006»
13 years 7 months ago
Distributed Reactive XML
XML-centric models of computation have been proposed as an answer to the demand for interoperability, heterogeneity and openness in coordination models. We present a prototype imp...
Thomas T. Hildebrandt, Henning Niss, Martin Olsen,...
CORR
2007
Springer
162views Education» more  CORR 2007»
13 years 7 months ago
Order-Invariant MSO is Stronger than Counting MSO in the Finite
We compare the expressiveness of two extensions of monadic second-order logic (MSO) over the class of finite structures. The first, counting monadic second-order logic (CMSO), ex...
Tobias Ganzow, Sasha Rubin
TIFS
2008
145views more  TIFS 2008»
13 years 7 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler