×

Found 14,699 Documents (Results 1–100)

Factorization of behavioral integrity. (English) Zbl 1499.68050

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 500-519 (2015).
MSC:  68M25 68Q85 94A60
PDFBibTeX XMLCite
Full Text: DOI

Attribute based broadcast encryption with short ciphertext and decryption key. (English) Zbl 1499.94051

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 252-269 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Checking trace equivalence: how to get rid of nonces? (English) Zbl 1499.68048

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 230-251 (2015).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Typing and compositionality for security protocols: a generalization to the geometric fragment. (English) Zbl 1499.68043

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 209-229 (2015).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Batch verifiable computation of polynomials on outsourced data. (English) Zbl 1522.68093

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 167-185 (2015).
MSC:  68M25 68M11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical invalid curve attacks on TLS-ECDH. (English) Zbl 1504.94150

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 407-425 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Practical threshold password-authenticated secret sharing protocol. (English) Zbl 1503.94053

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 347-365 (2015).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Making any identity-based encryption accountable, efficiently. (English) Zbl 1504.94160

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 326-346 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient zero-knowledge proofs for commitments from learning with errors over rings. (English) Zbl 1499.68113

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 305-325 (2015).
MSC:  68Q10 68Q11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Server-aided revocable identity-based encryption. (English) Zbl 1499.68057

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 286-304 (2015).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Updatable hash proof system and its applications. (English) Zbl 1502.94041

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 266-285 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Short accountable ring signatures based on DDH. (English) Zbl 1499.94054

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 243-265 (2015).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Symmetric-key based proofs of retrievability supporting public verification. (English) Zbl 1499.68092

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 203-223 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Efficient message authentication codes with combinatorial group testing. (English) Zbl 1504.94220

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 185-202 (2015).
MSC:  94A62 94A60 68M25
PDFBibTeX XMLCite
Full Text: DOI

Interleaving cryptanalytic time-memory trade-offs on non-uniform distributions. (English) Zbl 1504.94097

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 165-184 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Verifiably encrypted signatures: security revisited and a new construction. (English) Zbl 1504.94212

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 146-164 (2015).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Computational soundness for interactive primitives. (English) Zbl 1502.68052

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 125-145 (2015).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Information-based physics, influence, and forces. (English) Zbl 1483.94022

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 538-547 (2015).
MSC:  94A15 81P10
PDFBibTeX XMLCite
Full Text: DOI arXiv Link

Debruijn identities: from Shannon, Kullback-Leibler and Fisher to generalized \(\phi \)-entropies, \( \phi \)-divergences and \(\phi \)-Fisher informations. (English) Zbl 1483.62008

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 522-529 (2015).
MSC:  62B10 94A17 94A24
PDFBibTeX XMLCite
Full Text: DOI

Application of Kähler manifold to signal processing and Bayesian inference. (English) Zbl 1483.53121

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 113-120 (2015).
MSC:  53Z50 62F15 94A15
PDFBibTeX XMLCite
Full Text: DOI arXiv

Shannon’s formula and Hartley’s rule: a mathematical coincidence? (English) Zbl 1483.62065

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 105-112 (2015).
MSC:  62F15 62-03 94A24
PDFBibTeX XMLCite
Full Text: DOI HAL

Bayesian or Laplacien inference, entropy and information theory and information geometry in data and signal processing. (English) Zbl 1483.62011

Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 43-58 (2015).
MSC:  62B11 62F15 94A17
PDFBibTeX XMLCite
Full Text: DOI

Asymptotic behaviour of total generalised variation. (English) Zbl 1444.94020

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 702-714 (2015).
MSC:  94A08 49N45
PDFBibTeX XMLCite
Full Text: DOI arXiv

Alternating direction method of multiplier for Euler’s elastica-based denoising. (English) Zbl 1444.94026

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 690-701 (2015).
MSC:  94A08 49M25
PDFBibTeX XMLCite
Full Text: DOI

Infinite dimensional optimization models and PDEs for dejittering. (English) Zbl 1444.68282

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 678-689 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Convex image denoising via non-convex regularization. (English) Zbl 1444.94015

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 666-677 (2015).
MSC:  94A08 49M25 49N45
PDFBibTeX XMLCite
Full Text: DOI

Bilevel optimization with nonsmooth lower level problems. (English) Zbl 1444.94018

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 654-665 (2015).
MSC:  94A08 49M25 68T05
PDFBibTeX XMLCite
Full Text: DOI

Data-driven sub-Riemannian geodesics in \(\mathrm{SE}(2)\). (English) Zbl 1453.94003

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 613-625 (2015).
MSC:  94A08 53C17
PDFBibTeX XMLCite
Full Text: DOI

Solving minimal surface problems on surfaces and point clouds. (English) Zbl 1453.94017

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 601-612 (2015).
MSC:  94A08 58E12
PDFBibTeX XMLCite
Full Text: DOI

Edge-preserving integration of a normal field: weighted least-squares, TV and \(L^1\) approaches. (English) Zbl 1453.94016

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 576-588 (2015).
MSC:  94A08 49M25 68U10
PDFBibTeX XMLCite
Full Text: DOI

Invertible orientation scores of 3D images. (English) Zbl 1453.94011

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 563-575 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI arXiv

Multiscale texture orientation analysis using spectral total-variation decomposition. (English) Zbl 1453.94009

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 486-497 (2015).
PDFBibTeX XMLCite
Full Text: DOI

PDE-based color morphology using matrix fields. (English) Zbl 1444.65008

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 461-473 (2015).
MSC:  65D18 35R02 94A08
PDFBibTeX XMLCite
Full Text: DOI

Duality principle for image regularization and perceptual color correction models. (English) Zbl 1445.94004

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 449-460 (2015).
MSC:  94A08 35A15
PDFBibTeX XMLCite
Full Text: DOI Link

A variational model for color assignment. (English) Zbl 1444.68283

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 437-448 (2015).
MSC:  68U10 49N90 94A08
PDFBibTeX XMLCite
Full Text: DOI

Luminance-Hue specification in the RGB space. (English) Zbl 1453.94014

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 413-424 (2015).
MSC:  94A08 68U10
PDFBibTeX XMLCite
Full Text: DOI HAL

Deformable image registration with automatic non-correspondence detection. (English) Zbl 1453.94004

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 360-371 (2015).
MSC:  94A08 94A13
PDFBibTeX XMLCite
Full Text: DOI

Nonlocal joint segmentation registration model. (English) Zbl 1444.94019

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 348-359 (2015).
MSC:  94A08 35B27 35D35
PDFBibTeX XMLCite
Full Text: DOI

An image registration framework for sliding motion with piecewise smooth deformations. (English) Zbl 1444.94014

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 335-347 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Sparse aggregation framework for optical flow estimation. (English) Zbl 1444.68259

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 323-334 (2015).
MSC:  68T45 65D18 94A08
PDFBibTeX XMLCite
Full Text: DOI HAL

Fast minimization of region-based active contours using the shape Hessian of the energy. (English) Zbl 1444.94010

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 307-319 (2015).
MSC:  94A08 49Q10 65D18
PDFBibTeX XMLCite
Full Text: DOI

Interactive multi-label segmentation of RGB-D images. (English) Zbl 1453.94005

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 294-306 (2015).
MSC:  94A08 68U10
PDFBibTeX XMLCite
Full Text: DOI

Convex color image segmentation with optimal transport distances. (English) Zbl 1444.94023

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 256-269 (2015).
MSC:  94A08 49Q22 90C90
PDFBibTeX XMLCite
Full Text: DOI arXiv

Artifact-free variational MPEG decompression. (English) Zbl 1444.94005

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 216-228 (2015).
MSC:  94A08 49N90
PDFBibTeX XMLCite
Full Text: DOI Link

Solution-driven adaptive total variation regularization. (English) Zbl 1444.94016

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 203-215 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Regularization with sparse vector fields: from image compression to TV-type reconstruction. (English) Zbl 1444.94006

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 191-202 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI arXiv

Total variation restoration of images corrupted by Poisson noise with iterated conditional expectations. (English) Zbl 1444.94003

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 178-190 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI HAL

Some nonlocal filters formulation using functional rearrangements. (English) Zbl 1444.94012

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 166-177 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI

Compressing images with diffusion- and exemplar-based inpainting. (English) Zbl 1444.94021

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 154-165 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI

Cartoon-texture-noise decomposition with transport norms. (English) Zbl 1444.94004

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 142-153 (2015).
MSC:  94A08 49Q20 49Q22
PDFBibTeX XMLCite
Full Text: DOI

On debiasing restoration algorithms: applications to total-variation and nonlocal-means. (English) Zbl 1444.94009

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 129-141 (2015).
MSC:  94A08 62H35
PDFBibTeX XMLCite
Full Text: DOI arXiv

Bilevel image denoising using Gaussianity tests. (English) Zbl 1444.94011

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 117-128 (2015).
MSC:  94A08 90C90
PDFBibTeX XMLCite
Full Text: DOI HAL

A linear scale-space theory for continuous nonlocal evolutions. (English) Zbl 1444.94008

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 103-114 (2015).
MSC:  94A08 35B30 35R09
PDFBibTeX XMLCite
Full Text: DOI

Separable time-causal and time-recursive spatio-temporal receptive fields. (English) Zbl 1444.94017

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 90-102 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI arXiv

Morphological scale-space operators for images supported on point clouds. (English) Zbl 1444.68279

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 78-89 (2015).
MSC:  68U10 94A08
PDFBibTeX XMLCite
Full Text: DOI Link

New approximation of a scale space kernel on SE(3) and applications in neuroimaging. (English) Zbl 1444.94022

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 40-52 (2015).
MSC:  94A08 35H20
PDFBibTeX XMLCite
Full Text: DOI arXiv

The morphological equivalents of relativistic and alpha-scale-spaces. (English) Zbl 1444.94024

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 28-39 (2015).
MSC:  94A08
PDFBibTeX XMLCite
Full Text: DOI

Spectral representations of one-homogeneous functionals. (English) Zbl 1444.94007

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 16-27 (2015).
MSC:  94A08 49N90
PDFBibTeX XMLCite
Full Text: DOI arXiv

Scale-space theory for auditory signals. (English) Zbl 1444.94029

Aujol, Jean-François (ed.) et al., Scale space and variational methods in computer vision. 5th international conference, SSVM 2015, Lège-Cap Ferret, France, May 31 – June 4, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9087, 3-15 (2015).
MSC:  94A12
PDFBibTeX XMLCite
Full Text: DOI

Efficient and decentralized polling protocol for general social networks. (English) Zbl 1428.68146

Pelc, Andrzej (ed.) et al., Stabilization, safety, and security of distributed systems. 17th international symposium, SSS 2015, Edmonton, AB, Canada, August 18–21, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9212, 171-186 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption for cascade automata (extended abstract). (English) Zbl 1426.94087

Pelc, Andrzej (ed.) et al., Stabilization, safety, and security of distributed systems. 17th international symposium, SSS 2015, Edmonton, AB, Canada, August 18–21, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9212, 94-108 (2015).
MSC:  94A60 68Q45
PDFBibTeX XMLCite
Full Text: DOI

Nonanticipative duality of sources and channels with memory and feedback. (English) Zbl 1404.94030

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 325-335 (2015).
MSC:  94A24 90B18
PDFBibTeX XMLCite
Full Text: DOI

Information nonanticipative rate distortion function and its applications. (English) Zbl 1404.94008

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 317-324 (2015).
MSC:  94A08 93A30
PDFBibTeX XMLCite
Full Text: DOI arXiv

Directed information on abstract spaces: properties and extremum problems. (English) Zbl 1404.94002

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 307-315 (2015).
MSC:  94A08 93E20
PDFBibTeX XMLCite
Full Text: DOI arXiv

On Shannon’s duality of a source and a channel and nonanticipative communication and communication for control. (English) Zbl 1404.94029

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 291-305 (2015).
MSC:  94A24 60J10
PDFBibTeX XMLCite
Full Text: DOI

What Is distributed control with direct communication between controllers? (English) Zbl 1403.93027

van Schuppen, Jan H. (ed.) et al., Coordination control of distributed systems. Cham: Springer (ISBN 978-3-319-10406-5/pbk; 978-3-319-10407-2/ebook). Lecture Notes in Control and Information Sciences 456, 183-190 (2015).
PDFBibTeX XMLCite
Full Text: DOI

Hard invalidation of electronic signatures. (English) Zbl 1403.94097

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 421-436 (2015).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

A new lattice-based threshold attribute-based signature scheme. (English) Zbl 1403.94101

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 406-420 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

New constructions of T-function. (English) Zbl 1403.94076

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 395-405 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fully secure online/offline predicate and attribute-based encryption. (English) Zbl 1403.68057

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 331-345 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Revocable threshold attribute-based signature against signing key exposure. (English) Zbl 1403.94102

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 316-330 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption. (English) Zbl 1403.94066

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 301-315 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Adaptive-ID secure revocable identity-based encryption from lattices via subset difference method. (English) Zbl 1403.94050

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 283-297 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

User identity verification based on touchscreen interaction analysis in web contexts. (English) Zbl 1403.94085

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 268-282 (2015).
MSC:  94A60 68M11 68P25
PDFBibTeX XMLCite
Full Text: DOI

Half a century of practice: who Is still storing plaintext passwords? (English) Zbl 1403.94042

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 253-267 (2015).
MSC:  94A60 68M11 68P25
PDFBibTeX XMLCite
Full Text: DOI

Combined cache timing attacks and template attacks on stream cipher MUGI. (English) Zbl 1403.94054

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 235-249 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Estimating differential-linear distinguishers and applications to CTC2. (English) Zbl 1403.94060

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 220-234 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved differential analysis of block cipher PRIDE. (English) Zbl 1403.94088

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 209-219 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Batch blind signatures on elliptic curves. (English) Zbl 1403.94099

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 192-206 (2015).
MSC:  94A62 14G50
PDFBibTeX XMLCite
Full Text: DOI

Some elliptic subcovers of genus 3 hyperelliptic curves. (English) Zbl 1403.14064

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 181-191 (2015).
MSC:  14H52 14G50 94A60
PDFBibTeX XMLCite
Full Text: DOI

Models of curves from GHS attack in odd characteristic. (English) Zbl 1403.94084

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 171-180 (2015).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

sHMQV: an efficient key exchange protocol for power-limited devices. (English) Zbl 1403.94094

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 154-167 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strongly secure key exchange protocol with minimal KEM. (English) Zbl 1403.94082

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 139-153 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the effectiveness of different botnet detection approaches. (English) Zbl 1403.94061

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 121-135 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of fractional \(\omega\)mbNAF for scalar multiplication. (English) Zbl 1403.94068

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 109-120 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial prime factor exposure attacks on RSA and its Takagi’s variant. (English) Zbl 1403.94074

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 96-108 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cramer-Shoup like chosen ciphertext security from LPN. (English) Zbl 1403.94080

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 79-95 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New related key attacks on the RAKAPOSHI stream cipher. (English) Zbl 1403.94053

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 65-75 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault attacks on stream cipher Scream. (English) Zbl 1403.94055

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 50-64 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential fault analysis of streebog. (English) Zbl 1403.94040

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 35-49 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security of the SM2 signature scheme against generalized key substitution attacks. (English) Zbl 1398.94188

Chen, Liqun (ed.) et al., Security standardisation research. Second international conference, SSR 2015, Tokyo, Japan, December 15–16, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27151-4/pbk; 978-3-319-27152-1/ebook). Lecture Notes in Computer Science 9497, 140-153 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous credential system with efficient proofs for monotone formulas on attributes. (English) Zbl 1398.94203

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 262-278 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data. (English) Zbl 1398.68148

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 242-261 (2015).
MSC:  68P25 92D10 94A60
PDFBibTeX XMLCite
Full Text: DOI

\(k\)-anonymous microdata release via post randomisation method. (English) Zbl 1398.68138

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 225-241 (2015).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Almost optimum secret sharing schemes with cheating detection for random bit strings. (English) Zbl 1398.94196

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 213-222 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved efficiency of MP12. (English) Zbl 1398.94113

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 193-210 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software