Lee B, Boyd E, Daeson E, et al. Secure key issuing in ID-based cryptography[C]// Proceedings of the Second Australian Information Security Workshop-AISW 2004. Dunedin: Australian Computer Society, Inc, 2004:69-74.
[2]
Viola P, Jones M. Rapid object detection using a boosted cascade of simple features[J]. IEEE CVPR, 2001, 1(2): 511-518.
[3]
Schapire R E, Singer Y. Improved boosting algorithms using confidence-rated predictions[J]. Machine Learning, 37(3): 297-336.
[4]
Desmedt Y, Frankel Y. Threshold cryptosystem[C]// Advances in Cryptology-Crypto 89. Berlin: Spring- Verlag, 1989:231-236.
[5]
Friedman J, Hastie T, Tibshirani R. Additive logistic regression: a statistical view of boosting[J]. The Annals of Statistics, 2000, 28(2): 337-374 .
[6]
Schapire R E, Freund Y, Bartlett P, Lee W S. Boosting the margin: a new explanation for the effectiveness of voting methods[J]. The Annals of Statistics, 1998, 26 (5): 1651-1686.
Li Chuang, Ding Xiaoqing, Wu Youshou. A revised AdaBoost algorithm- AD AdaBoost[J]. Chinese Journal of Computers, 2007, 30 (1): 103-109.
[9]
Li Stan, Zhu Lang, Zhang Zhenqiu,et al. Statistical learning of multi-view face detection[J]. A theory of the learnable. Communications of ACM, 1984, 27 (11): 1134-1142.