Sciweavers

92 search results - page 10 / 19
» Hidden Identity-Based Signatures
Sort
View
AVSS
2007
IEEE
14 years 1 months ago
Detecting hidden objects: Security imaging using millimetre-waves and terahertz
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Radiation at these fre...
Mike C. Kemp
ICIP
2003
IEEE
14 years 23 days ago
Joint source-channel coding scheme for image-in-image data hiding
We consider the problem of hiding images in images. In addition to the usual design constraints such as imperceptible host degradation and robustness in presence of variety of att...
Kaushal Solanki, Onkar Dabeer, B. S. Manjunath, Up...
ACISP
2007
Springer
14 years 1 months ago
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
The identity of “Deep Throat”, a pseudonym of the information source in the Watergate scandal, remained mysterious for more than three decades. In 2005, an ex-FBI official cla...
Cheng-Kang Chu, Wen-Guey Tzeng
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 29 days ago
Optimization of the MOVA Undeniable Signature Scheme
This article presents optimization results on the recent MOVA undeniable signature scheme presented by Monnerat and Vaudenay at PKC ’04 as well as its generalization proposed at ...
Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
IJNSEC
2006
56views more  IJNSEC 2006»
13 years 7 months ago
Traffic Filtering and Routing in Partially-Hidden Networks
Suppose that an organization O wants to do the following: to reveal only part of its network map; to filter unwanted traffic passing through its network; and to route, to the righ...
Deholo Nali, Ali Miri, Carlisle M. Adams