Sciweavers

98 search results - page 14 / 20
» Undetachable Threshold Signatures
Sort
View
CIBCB
2009
IEEE
13 years 5 months ago
Shape modeling and clustering of white matter fiber tracts using fourier descriptors
Reliable shape modeling and clustering of white matter fiber tracts is essential for clinical and anatomical studies that use diffusion tensor imaging (DTI) tractography techniques...
Xuwei Liang, Qi Zhuang, Ning Cao, Jun Zhang
ESORICS
2009
Springer
14 years 8 months ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
NDSS
2003
IEEE
14 years 23 days ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
13 years 11 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
ICVGIP
2004
13 years 8 months ago
Content Based Image Retrieval with Multiresolution Salient Points
This paper presents a robust technique for Content Based Image Retrieval (CBIR) using salient points of an image. The salient points are extracted from different levels of the uns...
Minakshi Banerjee, Malay K. Kundu