|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
35 | Guosheng Xu 0001, Yixian Yang, Lize Gu, Xinxin Niu |
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. |
Web Intelligence/IAT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jianhong Zhang, Jian Mao |
A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Jianhong Zhang, Jane Mao |
Security Analysis of Two Signature Schemes and Their Improved Schemes. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Sijung Kim, Geuk Lee, Bonghan Kim |
The Design and Testing of Automated Signature Generation Engine for Worms Detection. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Javed Ahmed Mahar, Mohammad Khalid Khan, Mumtaz Hussain Mahar |
Off-Line Signature Verification of Bank Cheque Having Different Background Colors. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Restricted Universal Designated Verifier Signature. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Saif Zahir |
A Low Complexity Wavelet-Packets Based Image Signature for Indexing and Retrieval. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Feng Cao, Zhenfu Cao |
Security Model of Proxy-Multi Signature Schemes. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Jong Youl Choi, Philippe Golle, Markus Jakobsson |
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Sunghun Kim 0001, E. James Whitehead Jr. |
Properties of Signature Change Patterns. |
ICSM |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Wiroonsak Santipach, Michael L. Honig |
Signature optimization for CDMA with limited feedback. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Benoît Chevallier-Mames |
New Signature Schemes with Coupons and Tight Reduction. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Jianhong Zhang, Jiancheng Zou, Yumin Wang |
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Je Hong Park, Bo Gyeong Kang, Sangwoo Park |
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Zuowen Tan, Zhuojun Liu, Mingsheng Wang |
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Shin-Jia Hwang, Kuang-Hsi Chen |
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Benoît Chevallier-Mames |
An Efficient CDH-Based Signature Scheme with a Tight Security Reduction. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee |
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Siyuan Chen, Sargur N. Srihari |
Use of Exterior Contours and Shape Features in Off-line Signature Verification. |
ICDAR |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Wenqing Cheng, Weimin Lang, Zongkai Yang, Gan Liu, Yunmeng Tan |
An identity-based proxy ring signature scheme from bilinear pairings. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Weimin Lang, Yunmeng Tan, Zongkai Yang, Gan Liu, Bing Peng |
A new efficient ID-based proxy blind signature scheme. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Chunbo Ma, Dake He |
A New Chameleon Multi-signature Based on Bilinear Pairing. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Dong Zheng 0001, Huang Zheng, Kefei Chen, Weidong Kou |
ID-Based Proxy Blind Signature. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang |
Provably Secure and ID-Based Group Signature Scheme. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Zichen Li, Junmei Zhang, Weidong Kou |
The Unlinkability of Randomization-Enhanced Chaum's Blind Signature Scheme. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Yan Xie, Fangguo Zhang, Xiaofeng Chen 0001, Kwangjo Kim |
ID-Based Distributed "Magic Ink" Signature from Pairings. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Katsuhiko Ueda |
Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching. |
ICDAR |
2003 |
DBLP DOI BibTeX RDF |
|
35 | Shunsuke Araki |
A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Junji Shikata, Goichiro Hanaoka, Yuliang Zheng 0001, Hideki Imai |
Security Notions for Unconditionally Secure Signature Schemes. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Jean-Sébastien Coron |
Optimal Security Proofs for PSS and Other Signature Schemes. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Guilin Wang |
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
threshold group signatures, threshold-multisignatures, digital signatures, group signatures |
35 | Jan Camenisch, Anna Lysyanskaya |
A Signature Scheme with Efficient Protocols. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Chik How Tan, Xun Yi, Chee Kheong Siew |
Signature Schemes Based on 3rd Order Shift Registers. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang |
How to Construct Fail-Stop Confirmer Signature Schemes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Keeyoung |
A New Undeniable Signature Scheme Using Smart Cards. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai |
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
|
35 | Yuejian Wu, André Ivanov |
Reducing Hardware with Fuzzy Multiple Signature Analysis. |
IEEE Des. Test Comput. |
1995 |
DBLP DOI BibTeX RDF |
|
35 | Patrick Horster, Markus Michels, Holger Petersen 0002 |
Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
35 | Mohssen Alabbadi, Stephen B. Wicker |
A Digital Signature Scheme Based on Linear Error-correcting Block Codes. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
35 | George Panagopoulos, Christos Faloutsos |
Bit-Sliced Signature Files for Very Large Text Databases an a Parallel Machine Architecture. |
EDBT |
1994 |
DBLP DOI BibTeX RDF |
|
35 | Birgit Pfitzmann |
Sorting Out Signature Schemes. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
35 | Dik Lun Lee, Chun-Wu Roger Leng |
Partitioned Signature Files: Design Issues and Performance Evaluation. |
ACM Trans. Inf. Syst. |
1989 |
DBLP DOI BibTeX RDF |
|
35 | Kwanghyun Kim, Dong Sam Ha, Joseph G. Tront |
On using signature registers as pseudorandom pattern generators in built-in self-testing. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1988 |
DBLP DOI BibTeX RDF |
|
35 | Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng |
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
On-line/off-line signature, Forgeability, Attack, Security Analysis |
35 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jong Youl Choi, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil |
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
35 | Shengli Liu 0001, Xiaofeng Chen 0001, Fangguo Zhang |
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
ID-based cryptography, electronic cash, unforgeability, restrictive partially blind signature |
35 | Lingling Wang, Guoyin Zhang, Chunguang Ma |
ID-based deniable ring authentication with constant-size signature. |
Frontiers Comput. Sci. China |
2008 |
DBLP DOI BibTeX RDF |
deniable ring authentication, constant-size signature, privacy, bilinear pairings, ID-based |
35 | Kaoru Kurosawa, Jun Furukawa 0001 |
Universally Composable Undeniable Signature. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
undeniable signature scheme, Universal composability |
35 | V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar |
Signature Generation and Detection of Malware Families. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Static Analysis, Malware Detection, Signature Generation |
35 | Yaling Zhang, Jing Zhang, Yikun Zhang |
Multi-signers Strong Designated Verifier Signature Scheme. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Multi-signers, Designated Verifier Signature |
35 | Yong-Dong Zhang 0001, Sheng Tang, Jin-Tao Li 0001 |
Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
PCA (Principal Component Analysis), Hotelling’s T-square statistic, digital signature, image authentication |
35 | Min Cai, Kai Hwang 0001, Jianping Pan 0001, Christos Papadopoulos |
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
distributed aggregation tree, cardinality counting, Network security, distributed hash table, traffic measurement, Internet worms, signature generation, worm containment |
35 | Bin Li 0053, Kuanquan Wang, David Zhang 0001 |
Minimizing Spatial Deformation Method for Online Signature Matching. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
(3+1)D information, warping energy, Signature verification, deterministic annealing, thin-plate spline |
35 | Pedro Gómez 0001, Agustín Álvarez Marquina, Luis Miguel Mazaira-Fernández, Roberto Fernández, María Victoria Rodellar Biarge, Rafael Martínez 0001, Cristina Muñoz-Mulas |
Estimating the Dispersion of the Biometric Glottal Signature in Continuous Speech. |
NOLISP |
2007 |
DBLP DOI BibTeX RDF |
Speaker’s biometry, glottal signature, glottal source estimation |
35 | Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen |
Certificate Based (Linkable) Ring Signature. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Certificate Based, Ring Signature, Linkability |
35 | Ping Yu 0006, Stephen R. Tate |
An Online/Offline Signature Scheme Based on the Strong RSA Assumption. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption |
35 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Proxy Signature Without Random Oracles. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Without Random Oracles, CDH Problem, Bilinear Pairings, Proxy Signature |
35 | Youngseok Lee 0002, Seongho Shin, Taeck-Geun Kwon |
Signature-Aware Traffic Monitoring with IPFIX. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
flow and security, signature, traffic measurement, IPFIX |
35 | Wun-She Yap, Swee-Huay Heng, Bok-Min Goi |
An Efficient Certificateless Signature Scheme. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, signature scheme, Certificateless |
35 | Jin Li 0002, Yanming Wang |
Universal Designated Verifier Ring Signature (Proof) Without Random Oracles. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
Universal Designated verifier, Bilinear Pairings, Ring signature |
35 | Qusai Abuein, Susumu Shibusawa |
Signature Amortization Using Multiple Connected Chains. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
Multicast stream authentication, signature amortization, web security, hash chain |
35 | Shuhong Wang 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable security, Forward security, Blind signature, Strong RSA assumption |
35 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Versatile padding schemes for joint signature and encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
extractable commitments, feistel transform, joint signature and encryption, universal padding schemes, signcryption |
35 | Cheri Shakiban, Ryan Lloyd |
Classification of Signature Curves Using Latent Semantic Analysis. |
IWMM/GIAE |
2004 |
DBLP DOI BibTeX RDF |
signature curves, Latent Semantic Analysis (LSA), pattern recognition, computer vision, object recognition, categorization, weight functions |
35 | Jens-Matthias Bohli, Rainer Steinwandt |
On Subliminal Channels in Deterministic Signature Schemes. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
deterministic signature schemes, subliminal channels |
35 | Joseph K. Liu, Duncan S. Wong |
On the Security Models of (Threshold) Ring Signature Schemes. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Anonymity, Security Models, Bilinear Maps, Ring Signature |
35 | Ardhendu Behera, Denis Lalanne, Rolf Ingold |
Visual signature based identification of Low-resolution document images. |
ACM Symposium on Document Engineering |
2004 |
DBLP DOI BibTeX RDF |
document visual signature, document-based meeting retrieval, documents' content extraction, low-resolution document image identification |
35 | Tong Fang, Mohsen A. Jafari, Stephen C. Danforth, Ahmad Safari |
Signature analysis and defect detection in layered manufacturing of ceramic sensors and actuators. |
Mach. Vis. Appl. |
2003 |
DBLP DOI BibTeX RDF |
Layered manufacturing, Inspection system, Fused deposition of ceramics, Signature analysis, Defect detection |
35 | Jae Choon Cha, Jung Hee Cheon |
An Identity-Based Signature from Gap Diffie-Hellman Groups. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
GDH group, Elliptic curve, Weil pairing, ID-based signature |
35 | Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang 0001 |
Signature Schemes Based on Two Hard Problems Simultaneously. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
Signature, factorization, discrete logarithms |
35 | Jean-Sébastien Coron |
Security Proof for Partial-Domain Hash Signature Schemes. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Provable Security, Random Oracle Model, Signature Schemes |
35 | Olivier Markowitch, Shahrokh Saeednia |
Optimistic Fair Exchange with Transparent Signature Recovery. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
electronic commerce, digital signature, Fair exchange |
35 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
35 | Yuliang Zheng 0001 |
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
High Order Residues, RSA, Signature, Public Key Encryption, Signcryption |
35 | Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman |
NSS: An NTRU Lattice-Based Signature Scheme. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
public key authentication, NSS, digital signature, NTRU, lattice-based cryptography |
35 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward-Secure Threshold Signature Schemes. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
proactive cryptography, forward security, threshold cryptography, signature schemes |
35 | Chun-Shien Lu, Hong-Yuan Mark Liao |
Structural digital signature for image authentication: an incidental distortion resistant scheme. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
fragility, authentication, robustness, wavelet transform, digital signature |
35 | Ge Yu 0001, Guoren Wang, Kunihiko Kaneko, Akifumi Makinouchi |
Applying Signature Filtering Technique to Join Algorithms. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
filter, signature, Join |
35 | Ramanujan S. Kashi, Jianying Hu, Winston L. Nelson, William Turin |
A Hidden Markov Model approach to online handwritten signature verification. |
Int. J. Document Anal. Recognit. |
1998 |
DBLP DOI BibTeX RDF |
Hidden Markov Models, Signature verification, Fourier descriptors, Viterbi decoding |
35 | Justin Zobel, Alistair Moffat, Kotagiri Ramamohanarao |
Inverted Files Versus Signature Files for Text Indexing. |
ACM Trans. Database Syst. |
1998 |
DBLP DOI BibTeX RDF |
performance, indexing, inverted files, text indexing, signature files, text databases |
35 | Debabrata Ghosh, Nevin Kapur, Franc Brglez, Justin E. Harlow III |
Synthesis of Wiring Signature-Invariant Equivalence Class Circuit Mutants and Applications to Benchmarking. |
DATE |
1998 |
DBLP DOI BibTeX RDF |
signature-invariance, circuit mutants, benchmarking, equivalence class |
35 | Jeong-Ki Kim, Jae-Woo Chang |
A New Dynamic Signature File Method in Parallel Processing Environment |
DEXA |
1995 |
DBLP DOI BibTeX RDF |
dynamic signature files, frame-slicing technique, performance evaluation, parallel databases, extendible hashing |
35 | Robert Sabourin, Ginette Genest |
An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
off-line signature verification, multi-classifier combination, integrated classifiers, minimum distance classifiers, random forgeries, handwriting recognition, pattern classification, handwriting |
35 | Kazuo Ohta, Kenji Koyama |
Meet-in-the-Middle Attack on Digital Signature Schemes. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Authentication, Digital signature, Hash function, One-way function, Meet-in-the-middle attack |
35 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
35 | Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang 0002, Yan Chen 0004, Bin Liu 0001, Junchen Jiang, Yuezhou Lv |
NetShield: massive semantics-based vulnerability signature matching for high-speed networks. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
vulnerability signature, intrusion detection, deep packet inspection, signature matching |
35 | Bernadette Dorizzi, Raffaele Cappelli, Matteo Ferrara, Dario Maio, Davide Maltoni, Nesma Houmani, Sonia Garcia-Salicetti, Aurélien Mayoue |
Fingerprint and On-Line Signature Verification Competitions at ICB 2009. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
Technical Evaluations, Signature Categorization, Entropy, Fingerprint Verification, On-line signature Verification |
35 | Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin |
Short Group Signature Without Random Oracles. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
non-interactive proof system, Group signature, standard model, short signature |
35 | Kemal Bicakci, Nazife Baykal |
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
binding signature semantics, digital signature, revocation, attribute certificate, PMI |
35 | Flor Ramírez Rioja, Mariko Nakano-Miyatake, Héctor M. Pérez Meana, Karina Toscano |
Dynamics features Extraction for on-Line Signature verification. |
CONIELECOMP |
2004 |
DBLP DOI BibTeX RDF |
extraction of dynamics characteristics, forgery detection and off-line signature verification, Signature verification, dynamics verification |
35 | Tyne Liang, Suh-Yin Lee, Wei-Pang Yang |
False hits of tri-syllabic queries in a Chinese signature file. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
trisyllabic query false hits, Chinese signature file, superimposed coding method, character-based Chinese text retrieval, multisyllabic query, multicharacter query, random false hit, irrelevant characters, document signature, adjacency false hit, character sequence information, proper nouns, Chinese names, character hashing method, bigram, optimal weight assignment, query processing, optical character recognition, database theory, document image processing, visual databases |
35 | Xu-Hong Xiao, Ru-Wei Dai |
A hierarchical on-line Chinese signature verification system. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
Chinese signature verification, static features, statistic decision, input primitive string, reference primitive string, attributed automaton, reference databases, feature extraction, feature extraction, handwriting recognition, template matching, on-line, signature verification, verification processes, dynamic features |
35 | Aung Nway Oo, Ni Lar Thein |
DLP Based Proxy Blind Signature Scheme with Low-Computation. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
proxy blind signature, proxy signature, blind signature, DLP |
35 | Ya-Fen Chang, Yen-Cheng Lai, Mu-Yen Chen |
Further Remarks on Identity-Based RSA Multi-signature. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
identity-based signature (IBS), digital signature, RSA, public key cryptography, multi- signature |
35 | Zheng Lin 0010, Christos Faloutsos |
Frame-Sliced Signature Files. |
IEEE Trans. Knowl. Data Eng. |
1992 |
DBLP DOI BibTeX RDF |
frame-sliced signature files, superimposed coding method, write-once property, sequential signature file, bit-sliced signature file, performance, information retrieval, retrieval, file organisation, insertion, C language, prototype system, unified framework, UNIX workstations |
35 | Yinghua Min, Yashwant K. Malaiya, Boping Jin |
Analysis of Detection Capability of Parallel Signature Analyzers. |
IEEE Trans. Computers |
1991 |
DBLP DOI BibTeX RDF |
parallel signature analyzers, serial signature analyzers, PSAs, aliasing errors, two-signature scheme, logic testing, data compression, error detection codes |
34 | Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu 0001 |
Nominative Signature from Ring Signature. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Xiangxue Li, Kefei Chen, Shiqun Li |
Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Chong-zhi Gao, Zheng-an Yao, Lei Li 0022 |
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Hoda Jannati, Javad Mohajeri, Mahmoud Salmasizadeh |
New Proxy Signature, Proxy Blind Signature and Blind Proxy Signature Based on the Okamoto Signature. |
Security and Management |
2008 |
DBLP BibTeX RDF |
|
Displaying result #301 - #400 of 13353 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|