Sciweavers

91 search results - page 11 / 19
» Lattice-Based Blind Signatures
Sort
View
CSFW
2005
IEEE
14 years 4 months ago
Deciding Knowledge in Security Protocols under (Many More) Equational Theories
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
Martín Abadi, Véronique Cortier
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
14 years 2 months ago
Fractal Transform Based Large Digital Watermark Embedding and Robust Full Blind Extraction
The aim of this demonstration is to present the ongoing performance of our R. and D. watermarking scheme software. The proposed illustrations cover a large panel of original image...
Jean-Luc Dugelay, S. Roche
ICASSP
2011
IEEE
13 years 2 months ago
MIMO radar for direction finding with exploitation of time-frequency representations
In this paper we consider the exploitation of spatial timefrequency distribution (STFD) in multiple-input multipleoutput (MIMO) radar systems. STFD has been found useful in solvin...
Yimin Zhang, Moeness G. Amin
IEEEARES
2007
IEEE
14 years 4 months ago
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols
Voter anonymity, also known as unlinkability, is the primary requirement to satisfy privacy in e-voting protocols. Up until now, e-voting protocols have tried to make communicatio...
Orhan Cetinkaya, Ali Doganaksoy
ICISC
2001
162views Cryptology» more  ICISC 2001»
13 years 11 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng