搜索结果: 1-4 共查到“计算机科学技术 cient”相关记录4条 . 查询时间(0.046 秒)
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
Multiparty Key Exchange Effi cient Traitor Tracing
2015/8/5
Our traitor tracing system is fully collusion resistant with short ciphertexts, secret keys,
and public key. Ciphertext size is logarithmic in the number of users and secret key size is
independent ...
Constructing Visual Phrases for Effective and Efficient Object-Based Image Retrieval
Constructing Visual Phrases Effective and Effi cient Object-Based Image Retrieval
2013/7/17
The explosion of multimedia data necessitates effective and efficient ways for us to get access to our desired ones. In this article,we draw an analogy between image retrieval and text retrieval...
Efficient Multiple-Description Image Coding Using Directional Lifting-Based Transform
Image compression lifting-based transform multiple-description coding (MDC) wavelet
2013/7/17
This paper proposes an efficient two-description image coding technique. The two side descriptions of an image are generated by quincunx subsampling. The decoding from any side description is do...