Sciweavers

1094 search results - page 112 / 219
» List signature schemes
Sort
View
MMM
2007
Springer
128views Multimedia» more  MMM 2007»
14 years 4 months ago
Video Histogram: A Novel Video Signature for Efficient Web Video Duplicate Detection
The explosive growth of information technology and digital content industry stimulates various video applications over the Internet. Since it is quite easy to copy, reformat, modif...
Lu Liu, Wei Lai, Xian-Sheng Hua, Shi-Qiang Yang
PPDP
2005
Springer
14 years 3 months ago
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
Formal methods have proved to be very useful for analyzing cryptographic protocols. However, most existing techniques apply to the case of abstract encryption schemes and pairing....
Véronique Cortier, Michaël Rusinowitch...
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
14 years 4 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
ASIACRYPT
2003
Springer
14 years 3 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
CADE
2005
Springer
14 years 10 months ago
Connecting Many-Sorted Theories
Abstract. Basically, the connection of two many-sorted theories is obtained by taking their disjoint union, and then connecting the two parts through connection functions that must...
Franz Baader, Silvio Ghilardi