Sciweavers

97 search results - page 17 / 20
» Identity Based Public Verifiable Signcryption Scheme
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
14 years 1 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou
ICB
2007
Springer
205views Biometrics» more  ICB 2007»
14 years 2 months ago
Embedded Palmprint Recognition System on Mobile Devices
There are increasing requirements for mobile personal identification, e.g. to protect identity theft in wireless applications. Based on built-in cameras of mobile devices, palmprin...
Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 8 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
CAIP
2005
Springer
120views Image Analysis» more  CAIP 2005»
14 years 2 months ago
A New Approach to Camera Image Indexing
Abstract. This paper presents a color filter array (CFA) image indexing approach. To enhance the functionality of single-sensor consumer electronics such as digital cameras, imagi...
Rastislav Lukac, Konstantinos N. Plataniotis