Sciweavers

790 search results - page 100 / 158
» Hierarchical Group Signatures
Sort
View
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
15 years 10 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002
ICMCS
2005
IEEE
141views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Events Detection for an Audio-Based Surveillance System
The present research deals with audio events detection in noisy environments for a multimedia surveillance application. In surveillance or homeland security most of the systems ai...
Chloé Clavel, Thibaut Ehrette, Gaël Ri...
MCS
2005
Springer
15 years 9 months ago
Exploiting Class Hierarchies for Knowledge Transfer in Hyperspectral Data
Abstract. Obtaining ground truth for hyperspectral data is an expensive task. In addition, a number of factors cause the spectral signatures of the same class to vary with location...
Suju Rajan, Joydeep Ghosh
SACMAT
2004
ACM
15 years 9 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 4 months ago
On combinations of local theory extensions
Many problems in mathematics and computer science can be reduced to proving the satisfiability of conjunctions of literals in a background theory which is often the extension of a ...
Viorica Sofronie-Stokkermans