Sciweavers

2492 search results - page 20 / 499
» On the General Signature Trees
Sort
View
MVA
1996
109views Computer Vision» more  MVA 1996»
13 years 8 months ago
Image Features Based on a Mixed Fractal Model and Evaluation of Their Effectiveness in Image Retrieval
Many research works on content-based image retrieval have made use of image features. On the other hand, many kinds of image features have also been developed in the research fiel...
Toshinori Hayashi, Yuzuru Tanaka
CSR
2008
Springer
13 years 9 months ago
A Logspace Algorithm for Partial 2-Tree Canonization
Abstract. We show that partial 2-tree canonization, and hence isomorphism testing for partial 2-trees, is in deterministic logspace. Our algorithm involves two steps: (a) We exploi...
Vikraman Arvind, Bireswar Das, Johannes Köble...
ASIACRYPT
2009
Springer
14 years 2 months ago
Signature Schemes with Bounded Leakage Resilience
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (or possibly other internal state information) is leaked to an adv...
Jonathan Katz, Vinod Vaikuntanathan
EUROCRYPT
2004
Springer
14 years 28 days ago
Short Signatures Without Random Oracles
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in g...
Dan Boneh, Xavier Boyen
ASIACRYPT
2001
Springer
14 years 1 days ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo