Sciweavers

525 search results - page 30 / 105
» Threshold Schemes with Disenrollment
Sort
View
AINA
2004
IEEE
14 years 1 months ago
RED with Optimized Dynamic Threshold Deployment on Shared Buffer
Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, ...
Chengchen Hu, Bin Liu
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
14 years 3 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
ICIP
2002
IEEE
14 years 3 months ago
Fractal-wavelet image denoising
—The essence of fractal image denoising is to predict the fractal code of a noiseless image from its noisy observation. From the predicted fractal code, one can generate an estim...
Mohsen Ghazel, Edward R. Vrscay, George H. Freeman
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
14 years 3 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
ICIP
2001
IEEE
14 years 11 months ago
Video similarity detection with video signature clustering
The proliferation of video content on the web makes similarity detection an indispensable tool in web data management, searching, and navigation. We have previously proposed a com...
Sen-Ching S. Cheung, Avideh Zakhor