Sciweavers

1282 search results - page 95 / 257
» Signing on signing off
Sort
View
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Aggregating signatures of MPEG-4 elementary streams
A complete MPEG-4 stream consists of many elementary streams which may be generated by different authors. In the scenario of this paper, each author signs his own authentic elemen...
Yongdong Wu
ICMCS
2005
IEEE
185views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Automatic Object Trajectory-Based Motion Recognition Using Gaussian Mixture Models
In this paper, we propose a novel technique for modelbased recognition of complex object motion trajectories using Gaussian Mixture Models (GMM). We build our models on Principal ...
Faisal I. Bashir, Ashfaq A. Khokhar, Dan Schonfeld
IEEECIT
2005
IEEE
14 years 2 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
14 years 2 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
14 years 2 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi