Sciweavers

112 search results - page 12 / 23
» Improved Methods to Perform Threshold RSA
Sort
View
CCS
2008
ACM
13 years 9 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
JDCTA
2010
144views more  JDCTA 2010»
13 years 2 months ago
Research on SVDD Applied in Speaker Verification
In tradition probability statistics model, speaker verification threshold is instability in different test situations. A novel speaker verification method based on Support Vector ...
Yuhuan Zhou, Xiongwei Zhang, Jinming Wang, Yong Go...
PR
2006
125views more  PR 2006»
13 years 7 months ago
Palmprint identification using feature-level fusion
In this paper, we propose a feature-level fusion approach for improving the efficiency of palmprint identification. Multiple elliptical Gabor filters with different orientations a...
Adams Wai-Kin Kong, David Zhang, Mohamed Kamel
ICCD
2003
IEEE
89views Hardware» more  ICCD 2003»
14 years 4 months ago
Precomputation-based Guarding for Dynamic and Leakage Power Reduction
- This paper presents a precomputation-based guarding technique to reduce both dynamic and static power consumptions in CMOS VLSI circuits. More precisely, a high threshold sleep t...
Afshin Abdollahi, Massoud Pedram, Farzan Fallah, I...
ICASSP
2008
IEEE
14 years 1 months ago
Temporal masking for bit-rate reduction in audio codec based on Frequency Domain Linear Prediction
Audio coding based on Frequency Domain Linear Prediction (FDLP) uses auto-regressive model to approximate Hilbert envelopes in frequency sub-bands for relatively long temporal seg...
Sriram Ganapathy, Petr Motlícek, Hynek Herm...