Sciweavers

144 search results - page 11 / 29
» Signature Schemes Based on Two Hard Problems Simultaneously
Sort
View
ICCV
2005
IEEE
14 years 9 months ago
Simultaneous Facial Action Tracking and Expression Recognition Using a Particle Filter
The recognition of facial gestures and expressions in image sequences is an important and challenging problem. Most of the existing methods adopt the following paradigm. First, fa...
Fadi Dornaika, Franck Davoine
IJNSEC
2006
107views more  IJNSEC 2006»
13 years 7 months ago
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
An identity-based signcryption scheme with (t, n) shared unsigncryption is proposed, which is the integration of the signcryption scheme, the (t, n) threshold scheme and zero know...
Fagen Li, Xiangjun Xin, Yupu Hu
EUROCRYPT
2001
Springer
14 years 1 days ago
The Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N-resi...
Dario Catalano, Rosario Gennaro, Nick Howgrave-Gra...
CCS
2008
ACM
13 years 9 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 10 days ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino