Sciweavers

2492 search results - page 7 / 499
» On the General Signature Trees
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
An image signature for any kind of image
We describe an algorithm for computing an image signature, suitable for first-stage screening for duplicate images. Our signature relies on relative brightness of image regions, a...
Chi Wong, Marshall W. Bern, David Goldberg
ICICS
2001
Springer
13 years 12 months ago
Fair Electronic Cash Based on a Group Signature Scheme
Several new group signature schemes have been proposed in recent years. In addition, several applications for group signatures (including electronic cash) have been suggested. A ne...
Greg Maitland, Colin Boyd
ACL
1993
13 years 8 months ago
A Complete and Recursive Feature Theory
Various feature descriptions are being employed in constrained-based grammar formalisms. The common notational primitive of these descriptions are functional attributes called fea...
Rolf Backofen, Gert Smolka
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ITCC
2005
IEEE
14 years 1 months ago
A Proposal of Short Proxy Signature using Pairing
— In this paper, we propose a new pairing-based proxy signature. Most remarkable point in our proposal is that our scheme realizes short signature. More concretely, the explicit ...
Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto