Sciweavers

977 search results - page 78 / 196
» Secret image sharing
Sort
View
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 5 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
TPDS
2008
133views more  TPDS 2008»
15 years 3 months ago
Mutual Anonymity for Mobile P2P Systems
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communication and resource sharing patterns in unfixed network infrastructures. As priv...
Jinsong Han, Yunhao Liu
ICWSM
2009
15 years 1 months ago
Motivational, Structural and Tenure Factors that Impact Online Community Photo Sharing
In recent years, we have witnessed a significant growth of "social computing" services, or online communities where users contribute content in various forms, including ...
Oded Nov, Mor Naaman, Chen Ye
DEXAW
1997
IEEE
76views Database» more  DEXAW 1997»
15 years 8 months ago
A Model for Intuitive Knowledge Sharing
This paper proposes a system which eases the job of entering and sharing expert analysis on a database system, with emphasis to pictorial and document information. With this syste...
Pedro Furtado, Henrique Madeira
PERCOM
2005
ACM
16 years 3 months ago
PICASSO: Pervasive Information Chronicling, Access, Search, and Sharing for Organizations
Several researchers have pointed out and begun to demonstrate that it is now possible to digitize an entire lifetime of experiences into a pocket-sized storage device, and thus to...
Gopal Pingali, Mark Podlaseck, Sinem Güven