Sciweavers

1610 search results - page 10 / 322
» Identity Based Multisignatures
Sort
View
ICDAR
2005
IEEE
14 years 29 days ago
Enhancement of Layout-based Identification of Low-resolution Documents using Geometrical Color Distribution
This paper proposes a multi-signature document identification method that works robustly with lowresolution documents captured from handheld devices. The proposed method is based ...
Ardhendu Behera, Denis Lalanne, Rolf Ingold
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 7 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao
CHI
2003
ACM
14 years 7 months ago
Identity disclosure and the creation of social capital
In this paper, we describe the identity policy decisions for a community network outside of Boston, Massachusetts. To promote trust and accountability, a member's online iden...
David R. Millen, John F. Patterson
IMA
2001
Springer
117views Cryptology» more  IMA 2001»
13 years 11 months ago
An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the ...
Clifford Cocks
ACSW
2007
13 years 8 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung