Sciweavers

1143 search results - page 25 / 229
» pairing 2007
Sort
View
IJNSEC
2007
138views more  IJNSEC 2007»
13 years 9 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
PAMI
2007
169views more  PAMI 2007»
13 years 9 months ago
Estimating Optimal Parameters for MRF Stereo from a Single Image Pair
—This paper presents a novel approach for estimating the parameters for MRF-based stereo algorithms. This approach is based on a new formulation of stereo as a maximum a posterio...
Li Zhang, Steven M. Seitz
BMCBI
2006
122views more  BMCBI 2006»
13 years 10 months ago
PET-Tool: a software suite for comprehensive processing and managing of Paired-End diTag (PET) sequence data
Background: We recently developed the Paired End diTag (PET) strategy for efficient characterization of mammalian transcriptomes and genomes. The paired end nature of short PET se...
Kuo Ping Chiu, Chee-Hong Wong, Qiongyu Chen, Prami...
ATC
2007
Springer
14 years 4 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
FC
2007
Springer
136views Cryptology» more  FC 2007»
14 years 4 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan