Results 1 to 10 of about 122,790 (284)
USING MORPHOLOGICAL DIFFERENTIAL ATTRIBUTE PROFILES FOR CHANGE CATEGORIZATION IN HIGH RESOLUTION SAR IMAGES [PDF]
Change detection in urban and suburban areas through remote sensing satellite imagery is an important topic. Furthermore, it is of special interest to derive information on the category of detected changes is of special interest. In Boldt et al. (2012),
M. Boldt +4 more
doaj +1 more source
Anonymous attribute-based designated verifier signature
An Attribute-based signature (ABS), is a cryptographic scheme where someone can sign a message using any kind of predicates verified by the attributes he owns. For such scheme, it is expected to be impossible for users to collude to sign a message if none of them is originally able to sign the message on his own.
Blazy, Olivier +3 more
openaire +3 more sources
XML Security in Certificate Management - XML Certificator [PDF]
The trend of rapid growing use of XML format in data/document management system reveals that security measures should be urgently considered into next generation's data/document systems.
Cripps, Nathan, Lu, Joan
core +1 more source
Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
Searchable encryption is a promising technique that allows cloud service provider return the interested files to the user, even if the shared files are encrypted.
Xueyan Liu +4 more
doaj +1 more source
The New Method of Sensor Data Privacy Protection for IoT
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a
Yue Wu, Liangtu Song, Lei Liu
doaj +1 more source
DRAM Retention Behavior with Accelerated Aging in Commercial Chips
The cells in dynamic random access memory (DRAM) degrade over time as a result of aging, leading to poor performance and potential security vulnerabilities.
Md Kawser Bepary +2 more
doaj +1 more source
A study on the traceable attribute-based signature scheme provided with anonymous credentials
In order to provide the reliability of transmitted data in the era of big data, it is necessary to communicate by applying signature technology to data. There are various signature schemes, among which attribute-based signatures perform signatures based ...
Yong Woon Hwang +3 more
doaj +1 more source
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +4 more sources
Zero Shot Recognition with Unreliable Attributes [PDF]
In principle, zero-shot learning makes it possible to train a recognition model simply by specifying the category's attributes. For example, with classifiers for generic attributes like \emph{striped} and \emph{four-legged}, one can construct a ...
Grauman, Kristen, Jayaraman, Dinesh
core
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile ...
Rui SHI +5 more
doaj +2 more sources

