Sciweavers

38 search results - page 5 / 8
» Huff's Model for Elliptic Curves
Sort
View
WACV
2012
IEEE
12 years 4 months ago
Predicting human gaze using quaternion DCT image signature saliency and face detection
We combine and extend the previous work on DCT-based image signatures and face detection to determine the visual saliency. To this end, we transfer the scalar definition of image...
Boris Schauerte, Rainer Stiefelhagen
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
14 years 1 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
CCS
2010
ACM
14 years 3 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
DCC
2010
IEEE
13 years 8 months ago
Comparing two pairing-based aggregate signature schemes
In 2003, Boneh, Gentry, Lynn and Shacham (BGLS) devised the first provably-secure aggregate signature scheme. Their scheme uses bilinear pairings and their security proof is in the...
Sanjit Chatterjee, Darrel Hankerson, Edward Knapp,...