An efficient signature computation method

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Signature Extraction Method for Image Similarity Retrieval

The goal of similarity retrieval is to retrieve images that are similar to query image. Good access methods for large image databases are very important for efficient retrieval. The 2D B-string-based and unique-ID-based signature methods can provide four kinds of similarity retrieval, object and type-i, where 0 ≤ i ≤ 2, and can distinguish 169 spatial relationships. However, 169 spatial relatio...

متن کامل

An efficient QR based method for the computation of

An efficient and numerically stable method to determine all the Lyapunov characteristic exponents of a dynamical system is developed. Numerical experiments are presented highlighting some aspects of convergence, accuracy and efficiency in the computation of the Lyapunov characteristic exponents.

متن کامل

An Efficient Method for Computation of Legendre Moments

The two-dimensional (2D) and three-dimensional (3D) orthogonal moments are useful tools for 2D and 3D object recognition and image analysis. However, the problem of computation of orthogonal moments has not been well solved because there exist few algorithms that can efficiently reduce the computational complexity. As is well known, the calculation of 2D and 3D orthogonal moments by a straightf...

متن کامل

An Efficient Certificateless Signature Scheme

Certificateless public key cryptography (CLPKC) is a paradigm to solve the inherent key escrow problem suffered by identity-based cryptography (IBC). While certificateless signature is one of the most important security primitives in CLPKC, there are relatively few proposed schemes in the literature. In this paper, we manage to construct an efficient certificateless signature scheme based on th...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Design & Test of Computers

سال: 1992

ISSN: 0740-7475

DOI: 10.1109/54.173328