Sciweavers

915 search results - page 30 / 183
» Proof labeling schemes
Sort
View
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
14 years 1 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
ASIACRYPT
2004
Springer
14 years 1 months ago
On Provably Secure Time-Stamping Schemes
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the underlying hash function is collisionresistant but still no rigorous proofs have...
Ahto Buldas, Märt Saarepera
ICASSP
2011
IEEE
12 years 11 months ago
Learning a discriminative visual codebook using homonym scheme
This paper studies a method for learning a discriminative visual codebook for various computer vision tasks such as image categorization and object recognition. The performance of...
SeungRyul Baek, Chang D. Yoo, Sungrack Yun
ASIACRYPT
2006
Springer
13 years 11 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
CIKM
2007
Springer
14 years 2 months ago
A novel scheme for domain-transfer problem in the context of sentiment analysis
In this work, we attempt to tackle domain-transfer problem by combining old-domain labeled examples with new-domain unlabeled ones. The basic idea is to use old-domain-trained cla...
Songbo Tan, Gaowei Wu, Huifeng Tang, Xueqi Cheng