Sciweavers

1610 search results - page 30 / 322
» Identity Based Multisignatures
Sort
View
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 8 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
INFORMATICALT
2007
119views more  INFORMATICALT 2007»
13 years 8 months ago
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes
The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce t...
Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huan...
HICSS
2006
IEEE
77views Biometrics» more  HICSS 2006»
14 years 2 months ago
Using Social Contextual Information to Match Criminal Identities
Criminal identity matching is crucial to crime investigation in law enforcement agencies. Existing techniques match identities that refer to the same individuals based on simple i...
G. Alan Wang, Jennifer Jie Xu, Hsinchun Chen
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 3 months ago
The Impact of Social Support of Guild Members and Psychological Factors on Flow and Game Loyalty in MMORPG
The objective of this study is to identify the relationships in which social support influences flow and game loyalty through character control, character identity, guild identity...
Juseon Kang, Ilsang Ko, Yunjung Ko
PAMI
2007
121views more  PAMI 2007»
13 years 8 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...