Sciweavers

754 search results - page 31 / 151
» Generation of Signatures by Deformations
Sort
View
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
14 years 16 days ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
ESORICS
2008
Springer
13 years 10 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
ICDAR
2005
IEEE
14 years 2 months ago
Handwriting Matching and Its Application to Handwriting Synthesis
Since it is extremely expensive to collect a large volume of handwriting samples, synthesized data are often used to enlarge the training set. We argue that, in order to generate ...
Yefeng Zheng, David S. Doermann
ACMSE
2009
ACM
13 years 6 months ago
A secure unidirectional proxy re-encryption using identity and secret key exchange
Proxy re-encryption, abbreviated as PRE, is a cryptosystem which allows the proxy to re-encrypt a cirphertext without accessing the underlying message. The re-encryption protocol ...
Edna Milgo
GI
2007
Springer
14 years 2 months ago
Multisensor Based Generation of Templates for Object Tracking in Complex Scenarios
Abstract: Protection and surveillance of persons and facilities is frequently associated with automatic tracking of striking objects like vehicles or persons in an image sequence. ...
Carmen Witte, Klaus Jäger, Walter Armbruster,...