Sciweavers

6251 search results - page 1063 / 1251
» Randomness, Computability, and Density
Sort
View
CIS
2005
Springer
15 years 10 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
A black-box secret sharing scheme (BBSSS) for a given access structure works in exactly the same way over any finite Abelian group, as it only requires black-box access to group o...
Ronald Cramer, Serge Fehr, Martijn Stam
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
15 years 10 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
DCOSS
2005
Springer
15 years 10 months ago
A Distributed Greedy Algorithm for Connected Sensor Cover in Dense Sensor Networks
Abstract. Achieving optimal battery usage and prolonged network lifetime are two of the most fundamental issues in wireless sensor networks. By exploiting node and data redundancy ...
Amitabha Ghosh, Sajal K. Das
EMMCVPR
2005
Springer
15 years 10 months ago
Color Correction of Underwater Images for Aquatic Robot Inspection
In this paper, we consider the problem of color restoration using statistical priors. This is applied to color recovery for underwater images, using an energy minimization formulat...
Luz Abril Torres-Méndez, Gregory Dudek
« Prev « First page 1063 / 1251 Last » Next »