Sciweavers

3356 search results - page 72 / 672
» Thresholds and Expectation Thresholds
Sort
View
IEEECIT
2005
IEEE
14 years 2 months ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
CIVR
2004
Springer
189views Image Analysis» more  CIVR 2004»
14 years 2 months ago
Feature Based Cut Detection with Automatic Threshold Selection
There has been much work concentrated on creating accurate shot boundary detection algorithms in recent years. However a truly accurate method of cut detection still eludes researc...
Anthony Whitehead, Prosenjit Bose, Robert Lagani&e...
INDOCRYPT
2004
Springer
14 years 2 months ago
Separable Linkable Threshold Ring Signatures
A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer. A linkable ring signature, introduced by Liu, et al. [20], additional...
Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man...
ADHOCNOW
2003
Springer
14 years 2 months ago
Topology Control Problems under Symmetric and Asymmetric Power Thresholds
We consider topology control problems where the goal is to assign transmission powers to the nodes of an ad hoc network so as to induce graphs satisfying specific properties. The ...
Sven Oliver Krumke, Rui Liu, Errol L. Lloyd, Madha...
LICS
1998
IEEE
14 years 1 months ago
On Proofs about Threshold Circuits and Counting Hierarchies
Hierarchies (Extended Abstract) Jan Johannsen Chris Pollett Department of Mathematics Department of Computer Science University of California, San Diego Boston University La Jolla,...
Jan Johannsen, Chris Pollett