Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Abstract. Possibilistic knowledge bases gather propositional formulas associated with degrees belonging to a linearly ordered scale. These degrees reflect certainty or priority, de...
Most experiments in research on autonomous agents and mobile robots are performed either in simulation or on robots with static physical properties; evolvable hardware is hardly e...
A double stimulus subjective evaluation was performed to determine preferred frame rates at a fixed bit rate for low bit rate video. Stimuli consisted of eight reference color vid...
In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intel...