Sciweavers

625 search results - page 24 / 125
» Generalized Ring Signatures
Sort
View
FC
2005
Springer
97views Cryptology» more  FC 2005»
14 years 1 months ago
Time Capsule Signature
Abstract. We introduce a new cryptographic problem called time capsule signature. Time capsule signature is a ‘future signature’ that becomes valid from a specific future time...
Yevgeniy Dodis, Dae Hyun Yum
SBRN
2008
IEEE
14 years 1 months ago
Combining Distances through an Auto-Encoder Network to Verify Signatures
In this paper we present a system for off-line signature verification. The paper’s contributions are: i) Five distances were calculated and evaluated over the signature databas...
Milena R. P. Souza, Leandro R. Almeida, George D. ...
CIS
2007
Springer
14 years 1 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
ICIP
2007
IEEE
14 years 9 months ago
Unequal Length First-Order Linear-Phase Filter Banks for Efficient Image Coding
In this paper, we present the structure and design method for a firstorder linear-phase filter bank (FOLPFB) which has unequal filter lengths in its synthesis bank (UFLPFB). A FOL...
Yuichi Tanaka, Masaaki Ikehara, Truong Q. Nguyen
TON
2002
117views more  TON 2002»
13 years 7 months ago
Generalized loop-back recovery in optical mesh networks
Current means of providing loop-back recovery, which is widely used in SONET, rely on ring topologies, or on overlaying logical ring topologies upon physical meshes. Loop-back is d...
Muriel Médard, Richard A. Barry, Steven G. ...