Sciweavers

3356 search results - page 11 / 672
» Thresholds and Expectation Thresholds
Sort
View
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 8 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
14 years 1 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
ICDAR
2003
IEEE
14 years 1 months ago
Automatic Thresholding of Gray-level Using Multi-stage Approach
A multi-stage approach is presented for thresholding document images, along with its application. The proposed method is based on two stages. Global thresholding is used in first ...
Sue Wu, Adnan Amin
ISCAS
2007
IEEE
144views Hardware» more  ISCAS 2007»
14 years 2 months ago
A Fully Programmable Analog Window Comparator
— This paper presents a novel design of analog window comparator circuit. The comparator can adaptively adjust its error threshold according to the magnitude of input signal leve...
Rui Xiao, Amit Laknaur, Haibo Wang
ISPEC
2005
Springer
14 years 2 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng