Sciweavers

915 search results - page 69 / 183
» Proof labeling schemes
Sort
View
SCN
2010
Springer
176views Communications» more  SCN 2010»
13 years 6 months ago
The Fiat-Shamir Transform for Group and Ring Signature Schemes
The Fiat-Shamir (FS) transform is a popular tool to produce particularly efficient digital signature schemes out of identification protocols. It is known that the resulting signat...
Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
13 years 12 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
IJISEC
2008
69views more  IJISEC 2008»
13 years 8 months ago
A survey of certificateless encryption schemes and security models
Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
Alexander W. Dent
ICPR
2008
IEEE
14 years 2 months ago
A Bayesian Local Binary Pattern texture descriptor
In this paper, a Bayesian LBP operator is proposed. This operator is formulated in a novel Filtering, Labeling and Statistic (FLS) framework for texture descriptors. In the framew...
Chu He, Timo Ahonen, Matti Pietikäinen
ACL
2008
13 years 9 months ago
Refining Event Extraction through Cross-Document Inference
We apply the hypothesis of "One Sense Per Discourse" (Yarowsky, 1995) to information extraction (IE), and extend the scope of "discourse" from one single docum...
Heng Ji, Ralph Grishman