Sciweavers

51 search results - page 6 / 11
» New Digital Fingerprint Code Construction Scheme Using Group...
Sort
View
SECON
2008
IEEE
14 years 2 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
TRUST
2010
Springer
14 years 1 months ago
A Pairing-Based DAA Scheme Further Reducing TPM Resources
Direct Anonymous Attestation (DAA) is an anonymous signature scheme designed for anonymous attestation of a Trusted Platform Module (TPM) while preserving the privacy of the devic...
Ernie Brickell, Jiangtao Li
ICDAR
2009
IEEE
14 years 2 months ago
Error-Correcting Output Coding for the Convolutional Neural Network for Optical Character Recognition
It is known that convolutional neural networks (CNNs) are efficient for optical character recognition (OCR) and many other visual classification tasks. This paper applies error-co...
Huiqun Deng, George Stathopoulos, Ching Y. Suen
ASIACRYPT
2004
Springer
14 years 1 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
14 years 8 days ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang