Sciweavers

152 search results - page 17 / 31
» On Signatures of Knowledge
Sort
View
CCS
2006
ACM
14 years 6 days ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
ICIP
2005
IEEE
14 years 2 months ago
Towards pose invariant gait reconstruction
Recently, a lot of research has been conducted into the usefulness of gait for identification at a distance. Since the gait of a person is readily identified when extracted from...
Nick Spencer, John Carter
ISSRE
2010
IEEE
13 years 7 months ago
Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test
—Large scale systems (LSS) contain multiple subsystems that interact across multiple nodes in sometimes unforeseen and complicated ways. As a result, pinpointing the subsystems t...
Haroon Malik, Bram Adams, Ahmed E. Hassan
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
14 years 2 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 2 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...