Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
We discuss the availability questions that arise when digital time stamps are used for preserving the evidentiary value of electronic documents. We analyze the time-stamping protoc...
In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoff curve TM2 = N2 for 1 T N. ...
Abstract. In the previous papers (Masreliez and Martin, 1977; Novoviˇcova, 1987; Schick and Mitter, 1994) the problem of recursive estimation of linear dynamic systems parameters ...
Abstract. In this paper we propose a method for automating the process of detecting regions of motion in a video sequence in real time. The main idea of this work is to detect moti...