Sciweavers

2421 search results - page 109 / 485
» Message from the Co-Chairs
Sort
View

Presentation
945views
13 years 6 months ago
On the use of discrete Pascal transform in hiding data in images
The Discrete Pascal Transform (DPT) has been proved remarkably useful for edge detection, filter design, discrete-time signal interpolation and data hiding. In the present work a n...
COMPCON
1994
IEEE
14 years 1 months ago
Low Power Hardware for a High Performance PDA
The first product in the Newton family operates under severe constraints in the areas of performance, cost, heat dissipation, power consumption, scalability, size and weight. This...
Michael Culbert
EUROCRYPT
2007
Springer
14 years 1 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
CORR
2006
Springer
150views Education» more  CORR 2006»
13 years 9 months ago
An Achievability Result for the General Relay Channel
We consider the general relay channel. For this setup, the best achievability result was derived by Cover and ElGamal, in theorem 6 of their paper from 1979. In this work we apply...
Ron Dabora, Sergio D. Servetto
AMC
2005
121views more  AMC 2005»
13 years 9 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao