Sciweavers

1282 search results - page 213 / 257
» Signing on signing off
Sort
View
IJNSEC
2008
154views more  IJNSEC 2008»
13 years 9 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao
IJNSEC
2008
190views more  IJNSEC 2008»
13 years 9 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
ISCI
2008
86views more  ISCI 2008»
13 years 9 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
IJISTA
2006
113views more  IJISTA 2006»
13 years 9 months ago
Extraction of mid-level semantics from gesture videos using a Bayesian network
In this paper a method for extraction of mid-level semantics from sign language videos is proposed, by employing high level domain knowledge. The semantics concern labeling of the ...
Dimitrios I. Kosmopoulos, Ilias Maglogiannis
COR
2007
109views more  COR 2007»
13 years 9 months ago
Assessing performance and uncertainty in developing carpet reverse logistics systems
TheUScarpetindustryisstrivingtoreacha40%diversionratefromlandfillsby2012,accordingtoamemorandum of understanding signed by industry and government officials in 2002. As a result...
Markus Biehl, Edmund Prater, Matthew J. Realff