Sciweavers

109 search results - page 13 / 22
» Identity Based Undeniable Signatures
Sort
View
IJNSEC
2006
113views more  IJNSEC 2006»
13 years 8 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 2 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
BIRTHDAY
2012
Springer
12 years 4 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
MTA
2007
82views more  MTA 2007»
13 years 8 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
AVSS
2009
IEEE
14 years 1 months ago
Compact Signatures for 3D Face Recognition under Varying Expressions
We present a novel approach to 3D face recognition using compact face signatures based on automatically detected 3D landmarks. We represent the face geometry with inter-landmark d...
Fahad Daniyal, Prathap Nair, Andrea Cavallaro