|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 411 occurrences of 256 keywords
|
|
|
Results
Found 1825 publication records. Showing 1825 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
85 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 421-431, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks |
75 | Lei Shi, Shenghui Su, Zhengrong Xiang |
Design of a Passport Anti-forgery System Based on Digital Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings, pp. 101-111, 2009, Springer, 978-3-642-01392-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Passport anti-forgery, IC chip, Client / server, Algorithm, Digital signature scheme |
64 | Shenghui Su, Yongquan Cai, Changxiang Shen |
The Banknote Anti-forgery System Based on Digital Signature Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 44-49, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-forgery, Preliminary design, Verification, Digital signature |
64 | Vamsi Krishna Madasu, Mohd. Hafizuddin Mohd. Yusof, Madasu Hanmandlu, Kurt Kubik |
Off-Line Signature Verification and Forgery Detection System Based on Fuzzy Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2003: Advances in Artificial Intelligence, 16th Australian Conference on Artificial Intelligence, Perth, Australia, December 3-5, 2003, Proceedings, pp. 1003-1013, 2003, Springer, 3-540-20646-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Box-Method, Fuzzy Modeling, Signature Verification, Forgery detection |
61 | Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 428-444, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv |
61 | Jorge Guajardo, Bart Preneel, Pim Tuyls, Ahmad-Reza Sadeghi |
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
61 | Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls |
09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
56 | Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet |
Vocal Forgery in Forensic Sciences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Forensics ![In: Forensics in Telecommunications, Information and Multimedia, Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, Revised Selected Papers, pp. 179-185, 2009, Springer, 978-3-642-02311-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
disguised voices, identification, SVM classifier, voice conversion |
56 | Y. J. Song, R. Z. Liu, T. N. Tan |
Digital Watermarking for Forgery Detection in Printed Materials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2001, Second IEEE Pacific Rim Conference on Multimedia, Bejing, China, October 24-26, 2001, Proceedings, pp. 403-410, 2001, Springer, 3-540-42680-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
53 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 156-166, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
53 | Edson J. R. Justino, Flávio Bortolozzi, Robert Sabourin |
Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 10-13 September 2001, Seattle, WA, USA, pp. 1031-1034, 2001, IEEE Computer Society, 0-7695-1263-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
51 | Chou Chen Yang, Ren-Chiun Wang |
An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(3), pp. 91-96, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, smart card, password, forgery attack |
51 | Flor Ramírez Rioja, Mariko Nakano-Miyatake, Héctor M. Pérez Meana, Karina Toscano |
Dynamics features Extraction for on-Line Signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONIELECOMP ![In: 14th International Conference on Electronics, Communications, and Computers (CONIELECOMP 2004), 16-18 February 2004, Veracruz, Mexico, pp. 156-161, 2004, IEEE Computer Society, 0-7695-2074-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
extraction of dynamics characteristics, forgery detection and off-line signature verification, Signature verification, dynamics verification |
51 | Najah Muhammad, Muhammad Hussain 0001, Ghulam Muhammad, George Bebis |
Copy-Move Forgery Detection Using Dyadic Wavelet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGIV ![In: Eighth International Conference on Computer Graphics, Imaging and Visualization, CGIV 2011, Singapore, August 17-19, 2011, pp. 103-108, 2011, IEEE Computer Society, 978-1-4577-0981-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Image forgery detection, non-intrusive method, copy-move forgery, denoising |
51 | Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou |
Fast Forgery Detection with the Intrinsic Resampling Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 232-235, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
image forgery, intrinsic resampling properties, resampling, forgery detection |
48 | Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka |
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 54-72, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bleichenbacher’s forgery attack, RSASSA-PKCS-v1_5, time-stamp forgery, Acrobat, Acrobat Reader |
48 | Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls (eds.) |
Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
48 | Darko Kirovski |
Anti-Counterfeiting: Mixing the Physical and the Digital World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
48 | Boris Skoric, Marc X. Makkes |
Simplification of Controlled PUF primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
48 | Philippe Teuwen |
How to Make Smartcards Resistant to Hackers' Lightsabers? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
48 | Patrick Schaumont |
Engineering On-Chip Thermal Effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
48 | Boris Skoric, Pim Tuyls |
An efficient fuzzy extractor for limited noise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations for Forgery-Resilient Cryptographic Hardware ![In: Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009, 2009, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
45 | Yongdong Wu, Feng Bao 0001, Robert H. Deng |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 171-183, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | E. S. Gopi Subbu, N. Lakshmanan, T. Gokul, S. KumaraGanesh, Prerak R. Shah |
Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 194-197, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Arjen K. Lenstra, Igor E. Shparlinski |
Selective Forgery of RSA Signatures with Fixed-Pattern Padding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 228-236, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Karl Brincat, Chris J. Mitchell |
New CBC-MAC Forgery Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 3-14, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner |
A Remark on a Signature Scheme Where Forgery Can Be Proved. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 441-445, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
43 | Babak Mahdian, Stanislav Saic |
Detection of Near-Duplicated Image Regions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer Recognition Systems 2 ![In: Computer Recognition Systems 2, pp. 187-195, 2008, Springer, 978-3-540-75174-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Ziqing Mao, Ninghui Li, Ian M. Molloy |
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 238-255, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cross-Site Request Forgery, Web Security, Browser Security |
43 | Adam Barth, Collin Jackson, John C. Mitchell |
Robust defenses for cross-site request forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 75-88, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery, http referer header, web application firewall, same-origin policy |
43 | Seung-Jin Ryu, Hae-Yeoun Lee, Il-Weon Cho, Heung-Kyu Lee |
Document Forgery Detection with SVM Classifier and Image Quality Measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2008, 9th Pacific Rim Conference on Multimedia, Tainan, Taiwan, December 9-13, 2008. Proceedings, pp. 486-495, 2008, Springer, 978-3-540-89795-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
printer identification, Digital forensics, SVM classifier, forgery detection, image quality measures |
43 | Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh |
Forgery attack on the RPC incremental unforgeable encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 361, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
incremental encryption, forgery attack |
40 | Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo |
An Improvement of Remote User Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings, pp. 416-423, 2006, Springer, 3-540-49932-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack |
40 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 466-475, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
40 | Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo |
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking - ISPA 2006 Workshops, ISPA 2006 International Workshops, FHPCN, XHPC, S-GRACE, GridGIS, HPC-GTP, PDCE, ParDMCom, WOMP, ISDF, and UPWN, Sorrento, Italy, December 4-7, 2006, Proceedings, pp. 57-64, 2006, Springer, 3-540-49860-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack |
40 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 205-217, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
40 | SungJun Min, Go Yamamoto, Kwangjo Kim |
Weak Property of Malleability in NTRUSign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 379-390, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
NTRUSign, Strong Existential Forgery, Centered Norm, Digital Signature Scheme, Malleability |
40 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 1-20, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
40 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk |
RSA-Based Fail-Stop Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 161-166, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Fail-Stop Signature Schemes, Proof of Forgery, RSA |
35 | Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, Chiou-Ting Hsu |
Video forgery detection using correlation of noise residue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMSP ![In: International Workshop on Multimedia Signal Processing, MMSP 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia, pp. 170-174, 2008, IEEE Signal Processing Society, 978-1-4244-2295-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jean Hennebert, Renato Loeffel, Andreas Humm, Rolf Ingold |
A New Forgery Scenario Based on Regaining Dynamics of Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings, pp. 366-375, 2007, Springer, 978-3-540-74548-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Chunbo Ma, Jun Ao, Jianhua Li 0001 |
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (15) ![In: Online Communities and Social Computing, Second International Conference, OCSC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 124-133, 2007, Springer, 978-3-540-73256-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Chameleon, Authentication, Key Agreement, Deniability |
35 | Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama |
Analysis on Bleichenbacher's Forgery Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 1167-1174, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Weiqi Luo 0001, Jiwu Huang, Guoping Qiu |
Robust Detection of Region-Duplication Forgery in Digital Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 746-749, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Alisher Kholmatov, Berrin A. Yanikoglu |
SUSIG: an on-line signature database, associated protocols and benchmark results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 12(3), pp. 227-236, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Database, Biometrics, On-line signature verification |
32 | Yanlin Qin, Xiaoping Wu |
Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 762-765, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel, Mohan S. Kankanhalli |
A Survey on Digital Camera Image Forensic Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 16-19, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Tian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie, Mao-Pei Tsui |
Physics-motivated features for distinguishing photographic images and computer graphics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 13th ACM International Conference on Multimedia, Singapore, November 6-11, 2005, pp. 239-248, 2005, ACM, 1-59593-044-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
computer graphics, fractal, steganalysis, differential geometry, image authentication, natural image statistics, image forensics |
32 | Hikaru Morita, D. Sakamoto, Tetsu Ohishi, Yoshimitsu Komiya, Takashi Matsumoto 0001 |
On-Line Signature Verifier Incorporating Pen Position, Pen Pressure, and Pen Inclination Trajectories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6-8, 2001, Proceedings, pp. 318-323, 2001, Springer, 3-540-42216-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Reihaneh Safavi-Naini, Willy Susilo |
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 292-307, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Bin Fang 0001, Y. Y. Wang, Cheung H. Leung, Yuan Yan Tang, Paul C. K. Kwok, K. W. Tse 0001, Y. K. Wong |
A Smoothness Index based Approach for Off-line Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Fifth International Conference on Document Analysis and Recognition, ICDAR 1999, 20-22 September, 1999, Bangalore, India, pp. 785-787, 1999, IEEE Computer Society, 0-7695-0318-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Bart Preneel, Paul C. van Oorschot |
On the Security of Two MAC Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 19-32, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
32 | Jirí Grim, Petr Somol, Pavel Pudil |
Digital Image Forgery Detection by Local Statistical Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 579-582, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
local statistical models, distribution mixtures, EM algorithm, forgery detection |
32 | Jung Yeon Hwang, Dong Hoon Lee 0001, Moti Yung |
Universal forgery of the identity-based sequential aggregate signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 157-160, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
sequential aggregate signature, universal forgery, identity-based cryptography |
32 | Hailing Huang, Weiqiang Guo, Yu Zhang |
Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (2) ![In: PACIIA 2008, Volume 2, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 272-276, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
copy-move forgery, Image processing, feature matching, keypoints |
32 | Won-Du Chang, Jungpil Shin 0001 |
DPW Approach for Random Forgery Problem in Online Handwritten Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM (1) ![In: NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008 - Volume 1, pp. 347-352, 2008, IEEE Computer Society, 978-0-7695-3322-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Online Signature Verification, Random Forgery Problem, Dynamic Positional Warping, Dynamic Time Warping |
29 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 209-230, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
29 | Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
SOMA: mutual approval for included content in web pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 89-98, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery (XSRF), javascript, web security, cross-site scripting (XSS), same origin policy |
29 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 108-119, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack |
29 | Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper |
Collision Attacks on AES-Based MAC: Alpha-MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 166-180, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Alpha-MAC, selective forgery, MAC, AES, side-channel attack, message authentication codes, collision attack |
29 | Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern |
Index Calculation Attacks on RSA Signature and Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 38(1), pp. 41-53, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptanalsis, Index Calculation, ISO 9796, RSA, smoothness, signature, forgery |
29 | Guilin Wang |
Security Analysis of Several Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 252-265, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forgery |
29 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Secure and Efficient Digital Coins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 9-15, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS |
26 | Litty Koshy, S. Prayla Shyry |
YOLO-FORGERY: Forgery Detection in images via Deep Clifford gradient-based YOLOv4 Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Signal Image Video Process. ![In: Signal Image Video Process. 18(3), pp. 2095-2103, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Decheng Liu, Zeyang Zheng, Chunlei Peng, Yukai Wang, Nannan Wang 0001, Xinbo Gao 0001 |
Hierarchical Forgery Classifier on Multi-Modality Face Forgery Clues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 26, pp. 2894-2905, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao |
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.11473, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Jiahe Tian, Peng Chen, Cai Yu, Xiaomeng Fu, Xi Wang 0014, Jiao Dai, Jizhong Han |
Learning to Discover Forgery Cues for Face Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 3814-3828, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot |
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 1168-1182, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang 0001, Xinbo Gao 0001 |
Spatial-Temporal Frequency Forgery Clue for Video Forgery Detection in VIS and NIR Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 33(12), pp. 7943-7956, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Decheng Liu, Tao Chen, Chunlei Peng, Nannan Wang 0001, Ruimin Hu, Xinbo Gao 0001 |
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.11438, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot |
Forgery-aware Adaptive Vision Transformer for Face Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.11092, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot |
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.12489, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Sami Gazzah, Lamia Rzouga Haddada, Isam Shallal, Najoua Essoukri Ben Amara |
Digital Image Forgery Detection with Focus on a Copy-Move Forgery Detection: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: International Conference on Cyberworlds, CW 2023, Sousse, Tunisia, October 3-5, 2023, pp. 240-247, 2023, IEEE, 979-8-3503-1565-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Decheng Liu, Zeyang Zheng, Chunlei Peng, Yukai Wang, Nannan Wang 0001, Xinbo Gao 0001 |
Hierarchical Forgery Classifier On Multi-modality Face Forgery Clues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.14629, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Jianshu Li, Man Luo, Jian Liu, Tao Chen, Chengjie Wang, Ziwei Liu, Shuo Liu, Kewei Yang, Xuning Shao, Kang Chen, Boyuan Liu, Mingyu Guo, Ying Guo, Yingying Ao, Pengfei Gao |
Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.13505, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang 0001, Xinbo Gao 0001 |
Spatial-Temporal Frequency Forgery Clue for Video Forgery Detection in VIS and NIR Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.01906, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Long Zhuo, Shunquan Tan, Bin Li 0011, Jiwu Huang |
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 17, pp. 819-834, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Long Zhuo, Shunquan Tan, Bin Li 0011, Jiwu Huang |
Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2107.02434, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
26 | Somayeh Sadeghi, Sajjad Dadkhah, Hamid Abdullah Jalab, Giuseppe Mazzola, Diaa M. Uliyan |
State of the art in passive digital image forgery detection: copy-move image forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 21(2), pp. 291-306, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Isilay Bozkurt, Mustafa Hakan Bozkurt, Güzin Ulutas |
A new video forgery detection approach based on forgery line. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Turkish J. Electr. Eng. Comput. Sci. ![In: Turkish J. Electr. Eng. Comput. Sci. 25, pp. 4558-4574, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Timothy K. Shih, Joseph C. Tsai, Nick C. Tang, Shih-Ming Chang, Yaurice Y. Lin |
Video Forgery and Special Effect Production. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVIC ![In: Visual Informatics: Bridging Research and Practice, First International Visual Informatics Conference, IVIC 2009, Kuala Lumpur, Malaysia, November 11-13, 2009, Proceedings, pp. 35-37, 2009, Springer, 978-3-642-05035-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Timothy K. Shih, Joseph C. Tsai, Nick C. Tang, Shih-Ming Chang, Yaurice Y. Lin |
Video Forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGIT ![In: Future Generation Information Technology, First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings, pp. 7-11, 2009, Springer, 978-3-642-10508-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Jin Chen 0005, Daniel P. Lopresti, Fabian Monrose |
Toward Resisting Forgery Attacks via Pseudo-Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 10th International Conference on Document Analysis and Recognition, ICDAR 2009, Barcelona, Spain, 26-29 July 2009, pp. 51-55, 2009, IEEE Computer Society, 978-0-7695-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Renaud Feil, Louis Nyffenegger |
Evolution of cross site request forgery attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(1), pp. 61-71, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao |
Forgery-location highway monitoring systembased on video watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 625-629, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Combating digital document forgery using new secure information hiding algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 922-924, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim |
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 318-327, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 37-53, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Anoop M. Namboodiri, Shailesh Saini, Xiaoguang Lu, Anil K. Jain 0001 |
Skilled Forgery Detection in On-Line Signatures: A Multimodal Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 505-511, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jinhong Katherine Guo, David S. Doermann, Azriel Rosenfeld |
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 15th International Conference on Pattern Recognition, ICPR'00, Barcelona, Spain, September 3-8, 2000., pp. 2355-2358, 2000, IEEE Computer Society, 0-7695-0750-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell |
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 184-196, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Message Authentication Codes, CBC-MAC |
24 | Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 194-204, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh |
An improvement of Xu et al.'s authentication scheme using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010, pp. 15:1-15:5, 2010, ACM, 978-1-4503-0001-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cryptography, network security, smart card, hash function, password, authentication protocol |
21 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 36-52, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
21 | Danjun Pu, Gregory R. Ball, Sargur N. Srihari |
A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings, pp. 125-136, 2009, Springer, 978-3-642-03520-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 198-216, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Vivian L. Blankers, C. Elisa van den Heuvel, Katrin Franke, Louis Vuurpijl |
ICDAR 2009 Signature Verification Competition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 10th International Conference on Document Analysis and Recognition, ICDAR 2009, Barcelona, Spain, 26-29 July 2009, pp. 1403-1407, 2009, IEEE Computer Society, 978-0-7695-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Qiming Li, Sujoy Roy |
On the security of non-forgeable robust hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 3124-3127, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jinsong Gui, Xiaoheng Deng |
An Adaptive Topology-Based Reputation Model for Unstructured P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1505-1510, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Nick C. Tang, Timothy K. Shih, Hong-Yuan Mark Liao, Joseph C. Tsai, Hsing-Ying Zhong |
Motion extrapolation for video story planning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 16th International Conference on Multimedia 2008, Vancouver, British Columbia, Canada, October 26-31, 2008, pp. 685-688, 2008, ACM, 978-1-60558-303-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
layer segmentation, tracking, special effect, video inpainting |
Displaying result #1 - #100 of 1825 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|