نتایج جستجو برای: identification scheme

تعداد نتایج: 625502  

2010
Hani Daher Véronique Eglin Stéphane Bres Nicole Vincent

To obtain a good decomposition of handwritten strokes in manuscript images, the extraction of the medial axis represents a very important step. In this paper, we propose an automatic approach for the extraction of the median axis directly from the gray level images. This approach is based on the orientation and the stroke thickness analysis at different points of the handwritten shapes. This me...

Journal: :Theor. Comput. Sci. 2008
Guomin Yang Jing Chen Duncan S. Wong Xiaotie Deng Dongsheng Wang

Constructing an identification scheme is one of the fundamental problems in cryptography, and is very useful in practice. An identity-based identification (IBI) scheme allows a prover to identify himself to a public verifier who knows only the claimed identity of the prover and some public information. In this paper, we propose a new framework for both the design and analysis of IBI schemes. Ou...

Journal: :Int. J. Math. Mathematical Sciences 2004
Yury V. Zaika

The nonlinear inverse problem of determining the hydrogen permeability parameters of stratified materials is considered. The model includes diffusion, invertible capture and sorption/desorption processes on surface, which leads to dynamical boundary conditions. For the concentration impulses method, the equation of stationary oscillations of concentration is obtained. Parametric identification ...

2008
Toshiyuki Isshiki Keisuke Tanaka

We suggest to use short secret keys in the anonymous group identification scheme proposed by Lee, Deng, and Zhu [7] and prove that this scheme is secure under the discrete logarithm with short exponents assumption that solving the discrete logarithm problem modulo an n-bit prime p is hard even when the exponent is a small c-bit number. We show that the communication and the computation costs ar...

Journal: :Wireless Sensor Network 2011
Xu Li Xuegang Yu Ke He

City administrators need to guarantee bus priority in urban public transportation. Building large-scale dedicated bus lanes is a cost-effective solution but it suffers from illegal utilization of dedicated bus lines by other non-permitted vehicles. In general, two systems can be utilized for bus lane monitoring: road-side system and bus mounted system. Although the former one has the advantage ...

2005
U. Pal

In a multi-lingual multi-script country like India, a single text line of a document page may contain words of two or more scripts. For the Optical Character Recognition of such a document page it is necessary to identify different scripts from the document. In this paper, an automatic technique for word -wise identification of English, Devnagari and Urdu scripts from a single document is propo...

2010
B. Nielsen

We consider the identification problem for the model of Lee and Carter (1992). The parameters of this model are known only to be identified up to certain transformations. Forecasts from the model may therefore depend on the arbitrarily chosen identification scheme. A condition for invariant forecasts is proposed. A number of standard forecast models are analyzed.

2013
Andre Kurmann Elmar Mertens André Kurmann

Beaudry and Portier (2006) propose an identification scheme to study the effects of news shocks about future productivity in Vector Error Correction Models (VECM). This comment shows that their methodology does not have a unique solution, when applied to their VECMs with more than two variables. The problem arises from the interplay of cointegration assumptions and long-run restrictions imposed...

Journal: :IACR Cryptology ePrint Archive 2017
Edoardo Persichetti

The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following a framework introduced by Lyubashevsky to construct a digital signature scheme from an identification scheme. The scheme is based on quasi-cyclic codes and, while security relies on the ring algebra that is associated with them, the prop...

2002
Michel Abdalla Jee Hea An Mihir Bellare Chanathip Namprempre

The Fiat-Shamir paradigm for transforming identification schemes into signature schemes has been popular since its introduction because it yields efficient signature schemes, and has been receiving renewed interest of late as the main tool in deriving forward-secure signature schemes. In this paper, minimal (meaning necessary and sufficient) conditions on the identification scheme to ensure sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید