Sciweavers

298 search results - page 39 / 60
» Strong Anonymous Signatures
Sort
View
WPES
2005
ACM
14 years 29 days ago
Anonymous yet accountable access control
This paper introduces a novel approach for augmenting attributebased access control systems in a way that allows them to offer fully anonymous access to resources while at the sam...
Michael Backes, Jan Camenisch, Dieter Sommer
CVPR
2006
IEEE
14 years 1 months ago
A Shape Representation for Planar Curves by Shape Signature Harmonic Embedding
This paper introduces a new representation for planar curves. From the well-known Dirichlet problem for a disk, the harmonic function embedded in a circular disk is solely depende...
Sang-Mook Lee, A. Lynn Abbott, Neil A. Clark, Phil...
IJCNN
2007
IEEE
14 years 1 months ago
A Hybrid HMM/ANN Based Approach for Online Signature Verification
: This paper presents a new approach based on HMM/ANN hybrid for online signature verification. A group of ANNs are used as local probability estimators for an HMM. The Viterbi alg...
Zhong-Hua Quan, De-Shuang Huang, Kun-hong Liu, Kwo...
QEST
2010
IEEE
13 years 5 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
E2EMON
2006
IEEE
14 years 1 months ago
A Hybrid Approach for Accurate Application Traffic Identification
—The traffic dynamics of the Internet’s dominant applications, such as peer-to-peer and multimedia, worsen the accuracy of the existing application traffic identification. Ther...
Young J. Won, Byung-Chul Park, Hong-Taek Ju, Myung...