Sciweavers

1790 search results - page 82 / 358
» Noise in Bilinear Problems
Sort
View
CGF
2010
111views more  CGF 2010»
13 years 9 months ago
Density-based Outlier Rejection in Monte Carlo Rendering
The problem of noise in Monte-Carlo rendering arising from estimator variance is well-known and well-studied. In this work, we concentrate on identifying individual light paths as...
Christopher DeCoro, Tim Weyrich, Szymon Rusinkiewi...
ASIACRYPT
2003
Springer
14 years 24 days ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
CCS
2008
ACM
13 years 11 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
ITIIS
2010
240views more  ITIIS 2010»
13 years 7 months ago
Super-Resolution Iris Image Restoration using Single Image for Iris Recognition
Iris recognition is a biometric technique which uses unique iris patterns between the pupil and sclera. The advantage of iris recognition lies in high recognition accuracy; howeve...
Kwang Yong Shin, Byung Jun Kang, Kang Ryoung Park
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 7 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng