Sciweavers

1094 search results - page 114 / 219
» List signature schemes
Sort
View
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
14 years 3 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
CIVR
2005
Springer
154views Image Analysis» more  CIVR 2005»
14 years 3 months ago
A Novel Texture Descriptor Using Over-Complete Wavelet Transform and Its Fractal Signature
In the paper, we proposed a novel feature descriptor using over-complete wavelet transform and wavelet domain based fractal signature for texture image analysis and retrieval. Trad...
Qing Wang, David Dagan Feng
STOC
2009
ACM
187views Algorithms» more  STOC 2009»
14 years 10 months ago
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes
Algebraic codes that achieve list decoding capacity were recently constructed by a careful "folding" of the Reed-Solomon code. The "low-degree" nature of this f...
Venkatesan Guruswami
TRUST
2010
Springer
14 years 3 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
ACISP
2000
Springer
14 years 2 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski