An efficient signature computation method
نویسندگان
چکیده
منابع مشابه
An Efficient Signature Extraction Method for Image Similarity Retrieval
The goal of similarity retrieval is to retrieve images that are similar to query image. Good access methods for large image databases are very important for efficient retrieval. The 2D B-string-based and unique-ID-based signature methods can provide four kinds of similarity retrieval, object and type-i, where 0 ≤ i ≤ 2, and can distinguish 169 spatial relationships. However, 169 spatial relatio...
متن کاملAn efficient QR based method for the computation of
An efficient and numerically stable method to determine all the Lyapunov characteristic exponents of a dynamical system is developed. Numerical experiments are presented highlighting some aspects of convergence, accuracy and efficiency in the computation of the Lyapunov characteristic exponents.
متن کاملAn Efficient Method for Computation of Legendre Moments
The two-dimensional (2D) and three-dimensional (3D) orthogonal moments are useful tools for 2D and 3D object recognition and image analysis. However, the problem of computation of orthogonal moments has not been well solved because there exist few algorithms that can efficiently reduce the computational complexity. As is well known, the calculation of 2D and 3D orthogonal moments by a straightf...
متن کاملAn Efficient Certificateless Signature Scheme
Certificateless public key cryptography (CLPKC) is a paradigm to solve the inherent key escrow problem suffered by identity-based cryptography (IBC). While certificateless signature is one of the most important security primitives in CLPKC, there are relatively few proposed schemes in the literature. In this paper, we manage to construct an efficient certificateless signature scheme based on th...
متن کاملAn efficient blind signature scheme based on the elliptic curve discrete logarithm problem
Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Design & Test of Computers
سال: 1992
ISSN: 0740-7475
DOI: 10.1109/54.173328