Keyword : signature


Measurement of Length of a Single Tooth Using PCA-Signature and Bezier Curve
Pramual CHOORAT Werapon CHIRACHARIT Kosin CHAMNONGTHAI Takao ONOYE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/11/01
Vol. E97-A  No. 11 ; pp. 2161-2169
Type of Manuscript:  Special Section PAPER (Special Section on Smart Multimedia & Communication Systems)
Category: 
Keyword: 
dental x-ray imageprinciple component analysissignaturesmoothing filterpeak detectionbezier curvetooth root length
 Summary | Full Text:PDF

Efficient Large-Scale Video Retrieval via Discriminative Signatures
Pengyi HAO Sei-ichiro KAMATA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/08/01
Vol. E96-D  No. 8 ; pp. 1800-1810
Type of Manuscript:  PAPER
Category: Image Processing and Video Processing
Keyword: 
individual retrievalsignaturelinear discriminant analysisvideo dataset
 Summary | Full Text:PDF

Indexing All Rooted Subgraphs of a Rooted Graph
Tomoki IMADA Hiroshi NAGAMOCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/03/01
Vol. E95-D  No. 3 ; pp. 712-721
Type of Manuscript:  Special Section PAPER (Special Section on Foundations of Computer Science – Mathematical Foundations and Applications of Computer Science and Algorithms –)
Category: 
Keyword: 
graph isomorphismindexrooted graphsouterplanar graphssignature
 Summary | Full Text:PDF

Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks
Rabindra BISTA Yong-Ki KIM Myoung-Seon SONG Jae-Woo CHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 67-77
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Trust
Keyword: 
wireless sensor networkdata aggregationdata integritydata privacysignature
 Summary | Full Text:PDF

Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
Taek-Young YOUN Young-Ho PARK Taekyoung KWON Soonhak KWON Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1481-1484
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Secure Communication
Keyword: 
signaturebatch signingimbalanced communication
 Summary | Full Text:PDF

On Waters' Signature Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10 ; pp. 2684-2685
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
cryptographysignaturekey substitution attacks
 Summary | Full Text:PDF

Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes
Hong WANG Gang QIU Deng-Guo FENG Guo-Zhen XIAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/03/01
Vol. E89-A  No. 3 ; pp. 822-825
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
threshold cryptographysignaturecryptanalysisforward-securesecure multiparty computation
 Summary | Full Text:PDF

A Distributed Sign-and-Encryption for Anonymity
DongJin KWAK SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 228-230
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritysignaturegroup signaturesigncryptionanonymity
 Summary | Full Text:PDF

Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems
Yuh-Min TSENG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/05/01
Vol. E86-B  No. 5 ; pp. 1679-1681
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographycryptanalysissignaturecomputer viruses
 Summary | Full Text:PDF

Two Efficient Server-Aided RSA Secret Computation Protocols Against Active Attacks
Shin-Jia HWANG Chin-Chen CHANG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9 ; pp. 1504-1511
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
server-aided secret computationRSAsignaturepassive attacksactive attacks
 Summary | Full Text:PDF