|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
30 | Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
Remark on the Threshold RSA Signature Scheme. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Tatsuaki Okamoto |
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
30 | Kazuhiko Iwasaki |
Analysis and proposal of signature circuits for LSI testing. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1988 |
DBLP DOI BibTeX RDF |
|
30 | Christos Faloutsos, Stavros Christodoulakis |
Description and Performance Analysis of Signature File Methods for Office Filing. |
ACM Trans. Inf. Syst. |
1987 |
DBLP DOI BibTeX RDF |
|
30 | Ralph C. Merkle |
A Digital Signature Based on a Conventional Encryption Function. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
30 | Louis C. Guillou, Jean-Jacques Quisquater |
Efficient Digital Public-Key Signature with Shadow (Abstract). |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
30 | David P. Himmel |
Signature and facial image compression by boundary encoding. |
AFIPS National Computer Conference |
1977 |
DBLP DOI BibTeX RDF |
|
30 | Emanuele Maiorana, Patrizio Campisi, Alessandro Neri 0001 |
Feature Selection and Binarization for On-Line Signature Recognition. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
On-line Signature, Feature Binarization, Feature Selection, Biometrics, Watermarking |
30 | Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Cheng |
A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU. |
APPT |
2009 |
DBLP DOI BibTeX RDF |
network security, GPU, parallel model, signature matching |
30 | Lei Shi, Shenghui Su, Zhengrong Xiang |
Design of a Passport Anti-forgery System Based on Digital Signature Schemes. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Passport anti-forgery, IC chip, Client / server, Algorithm, Digital signature scheme |
30 | Joseph K. Liu, Joonsang Baek, Jianying Zhou 0001 |
Certificate-based sequential aggregate signature. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
cryptography, digital signature |
30 | Shahriar Mohammadi, Sanaz Abedi |
ECC-Based Biometric Signature: A New Approach in Electronic Banking Security. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
biometeric signature, electronic banking, ECC |
30 | Jia Yu 0003, Fanyu Kong, Rong Hao, Dexiang Zhang |
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
server-assisted signature, security, forward security |
30 | Indriyati Atmosukarto, Linda G. Shapiro |
A salient-point signature for 3d object retrieval. |
Multimedia Information Retrieval |
2008 |
DBLP DOI BibTeX RDF |
3d object signature, 3d object retrieval, salient points |
30 | Randy Smith, Cristian Estan, Somesh Jha |
XFA: Faster Signature Matching with Extended Automata. |
SP |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, regular expressions, finite automata, signature matching |
30 | Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga |
LISABETH: automated content-based signature generator for zero-day polymorphic worms. |
SESS |
2008 |
DBLP DOI BibTeX RDF |
automatic content-based signature generation, intrusion detection, network security, polymorphic worms |
30 | Marc Joye |
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
on-line/off-line signing, Cryptography, digital signature, standard model |
30 | Xiaohua Zhou, Xiaohua Hu 0001, Xiaodan Zhang |
Topic Signature Language Models for Ad hoc Retrieval. |
IEEE Trans. Knowl. Data Eng. |
2007 |
DBLP DOI BibTeX RDF |
Semantic Smoothing, Topic Signature, Multiword Phrase, Information Retrieval, Language Models, Concept |
30 | Chia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur |
A secure protocol for misbehavior-penalization-based fair digital signature exchange. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, information security, fair exchange |
30 | Je-Gyeong Jo, Jong-Won Seo, Hyung-Woo Lee |
Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint. |
FAW |
2007 |
DBLP DOI BibTeX RDF |
Biometrics Digital Key, Digital Key Generation, Digital Signature, Secure Communication, Fuzzy Vault |
30 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Duncan S. Wong, Wei Wu 0001 |
Certificateless Signature Revisited. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Certificateless cryptology, Signature, Security model, Random oracle |
30 | Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang |
Proxy Re-signature Schemes Without Random Oracles. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
proxy re-signature, existential unforgeability, standard model, bilinear maps, ID-based |
30 | XiaoFeng Wang 0001, Zhuowei Li 0001, Jun Xu 0003, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi |
Packet vaccine: black-box exploit detection and signature generation. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
black-box defense, exploit detection, vaccine injection, worm, signature generation |
30 | Gwenaëlle Martinet, Guillaume Poupard, Philippe Sola |
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
partially blind signature, Cryptanalysis, electronic cash |
30 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li |
Identity-Based Key-Insulated Signature with Secure Key-Updates. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure |
30 | Simon P. Chung, Aloysius K. Mok |
Allergy Attack Against Automatic Signature Generation. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Adaptive Response, Intrusion Prevention |
30 | Kaoru Kurosawa, Swee-Huay Heng |
Relations Among Security Notions for Undeniable Signature Schemes. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature |
30 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. |
SOFSEM |
2006 |
DBLP DOI BibTeX RDF |
Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery |
30 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
30 | Wen-Chung Kuo, Ming-Yang Chen |
A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
RSA, Secret Sharing, Proxy Signature |
30 | M. Choudary Gorantla, Ashutosh Saxena |
Verifiably Encrypted Signature Scheme Without Random Oracles. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
Bilinear Pairings, Fair Exchange, Random Oracles, Verifiably Encrypted Signature |
30 | Ana Isabel González-Tablas Ferreres, Karel Wouters |
Integrating XML Linked Time-Stamps in OASIS Digital Signature Services. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
Linked time-stamping, Digital Signature Services, XML security |
30 | Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng |
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
security analysis, Undeniable signature |
30 | Kaoru Kurosawa, Swee-Huay Heng |
3-Move Undeniable Signature Scheme. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Undeniable signature, witness indistinguishability |
30 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack |
30 | Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei |
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
Signature Schemes, Coding Theory |
30 | Vamsi Krishna Madasu, Mohd. Hafizuddin Mohd. Yusof, Madasu Hanmandlu, Kurt Kubik |
Off-Line Signature Verification and Forgery Detection System Based on Fuzzy Modeling. |
Australian Conference on Artificial Intelligence |
2003 |
DBLP DOI BibTeX RDF |
Box-Method, Fuzzy Modeling, Signature Verification, Forgery detection |
30 | Craig Gentry, Michael Szydlo |
Cryptanalysis of the Revised NTRU Signature Scheme. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
NSS, NTRUSign, Orthogonal Lattice, Cyclotomic Integer, Galois Congruence, Cryptanalysis, Signature Scheme, Lattice Reduction, NTRU |
30 | Geneviève Arboit, Jean-Marc Robert 0001 |
From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
padding scheme, atomic primitive, hash-and-sign, division intractability, smooth numbers, Digital signature, RSA, provable security |
30 | Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou |
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, error-correcting code |
30 | Carlo Sansone, Mario Vento |
Signature Verification: Increasing Performance by a Multi-Stage System. |
Pattern Anal. Appl. |
2000 |
DBLP DOI BibTeX RDF |
Document validation, Serial combination, Classification, Reliability, Signature verification, Reject option, Multi-expert systems |
30 | Edson J. R. Justino, Abdenaim El Yacoubi, Flávio Bortolozzi, Robert Sabourin |
An Off-Line Signature Verification System using Hidden Markov Model and Cross-Validation. |
SIBGRAPI |
2000 |
DBLP DOI BibTeX RDF |
off-line signature verification system, pre-processing process, segmentation process, feature extraction process, random falsifications, false acceptance concept, false rejection concept, intrapersonal variation, interpersonal variation, automatic decision threshold derivation, hidden Markov model, handwriting recognition, cross-validation, learning process |
30 | E. A. Fadhel, Pushpak Bhattacharyya |
Application of a Steerable Wavelet Transform using Neural Network for Signature Verification. |
Pattern Anal. Appl. |
1999 |
DBLP DOI BibTeX RDF |
Off-line signature verification, Neural networks, Wavelet transform |
30 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk |
RSA-Based Fail-Stop Signature Schemes. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Fail-Stop Signature Schemes, Proof of Forgery, RSA |
30 | Mohammed Fadle Abdulla, C. P. Ravikumar, Anshul Kumar |
Optimization of Mutual and Signature Testing Schemes for Highly Concurrent Systems. |
J. Electron. Test. |
1998 |
DBLP DOI BibTeX RDF |
mutual checking, multiple signature testing, self loops, built-in self test, aliasing |
30 | Khedija Arour, Ali Jaoua |
Rectangular Decomposition of Signature File: Design Issues and Performance Evaluation. |
DEXA |
1998 |
DBLP DOI BibTeX RDF |
Rectangular decomposition, Clustering, Information retrieval, Performance analysis, Access method, Signature file, Superimposed coding, Rectangle |
30 | Guillaume Poupard, Jacques Stern |
Security Analysis of a Practical "on the fly" Authentication and Signature Generation. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
general discrete logarithm problem, minimal on-line computation, low cost smart cards, digital signature, security analysis, Identification scheme |
30 | Neal Koblitz |
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve |
30 | Ramanujan S. Kashi, Jianying Hu, Winston L. Nelson, William Turin |
On-line Handwritten Signature Verification using Hidden Markov Model Features. |
ICDAR |
1997 |
DBLP DOI BibTeX RDF |
Hidden Markov Models, Signature Verification, Fourier Descriptors, Viterbi decoding |
30 | Sunil R. Das, Nishith Goel, Wen-Ben Jone, Amiya R. Nayak |
Syndrome signature in output compaction for VLSI BIST. |
VLSI Design |
1996 |
DBLP DOI BibTeX RDF |
syndrome signature, output compaction, VLSI BIST, input patterns, n-input combinational circuit, primary syndrome, subsyndromes, subfunctions, single-output circuit, multiple output, VLSI, logic testing, data compression, built-in self test, integrated circuit testing, combinational circuits, switching functions, exhaustive testing |
30 | Xuhua Yang, Takeshi Furuhashi, Kenzo Obata, Yoshiki Uchikawa |
Constructing a High Performance Signature Verification System Using a GA Method. |
ANNES |
1995 |
DBLP DOI BibTeX RDF |
Fuzzy Network, Feature Selection, GA, Signature Verification |
30 | Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax |
Fortifying the dalì attack on digital signature. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
E-signature, digital signature, vulnerability analysis |
30 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi |
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
e-cheque, Parallel multi-signature, Digital Signature, Forward-Security, ElGamal Signatures |
30 | Pei-Yih Ting, Xiao-Wei Huang |
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Threshold proxy signature, Cryptography, Proxy signature |
30 | Omaima Bamasak, Ning Zhang 0001 |
Reputation management and signature delegation: A distributed approach. |
Electron. Commer. Res. |
2006 |
DBLP DOI BibTeX RDF |
Signature delegation, Mobile agent-based e-commerce, Proxy signature, Reputation management |
30 | Lin-Chuan Wu |
Analysis of traceability attack on Camenisch et al.'s blind signature schemes. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, information security, blind signature, untraceability |
30 | Mario E. Munich, Pietro Perona |
Visual Identification by Signature Tracking. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2003 |
DBLP DOI BibTeX RDF |
Systems and applications, signature recognition, biometrics, signature verification, active and real-time vision |
30 | Ray R. Hashemi, Mahmood Bahar, Alexander A. Tyler, Azita Bahrami, Nan Tang 0003, William G. Hinson |
Development of Group's Signature for Evaluation of Skin Cancer in Mice Caused by Ultraviolet Radiation. |
ITCC |
2003 |
DBLP DOI BibTeX RDF |
Signature Validation, Skin Cancer and Ultraviolet Radiation, Self-Organizing Map, Group Signature |
30 | Andrzej Hlawiczka, Michael Gössel, Egor S. Sogomonyan |
A linear code-preserving signature analyzer COPMISR. |
VTS |
1997 |
DBLP DOI BibTeX RDF |
linear separable code, code preserving multi-input signature register, COPMISR, concurrent checking, parity code, group -parity code, BIST, linear codes, Hamming code, duplication code, XOR-gate, signature analyzer, on-line error detection |
29 | He Ge, Stephen R. Tate |
A group signature scheme with signature claiming and variable linkability. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Daigo Muramatsu, Takashi Matsumoto 0001 |
An HMM On-line Signature Verifier Incorporating Signature Trajectories. |
ICDAR |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Natalia Stakhanova, Ali A. Ghorbani 0001 |
Managing intrusion detection rule sets. |
EUROSEC |
2010 |
DBLP DOI BibTeX RDF |
detection rules, intrusion detection signatures |
27 | Vadim Lyubashevsky |
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Léonard Dallot, Damien Vergnaud |
Provably Secure Code-Based Threshold Ring Signatures. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Sharifah Mumtazah Syed Ahmad, Asma Shakil, Abdul Rahim Ahmad, Mustafa Agil Muhamad Balbed, Rina Bt. Md. Anwar |
SIGMA - A Malaysian signatures' database. |
AICCSA |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Shuming Chen, Xiao Hu, Biwei Liu, Jihua Chen |
An On-Line Control Flow Checking Method for VLIW Processor. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Adam Bender, Jonathan Katz, Ruggero Morselli |
Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Craig Gentry, Zulfikar Ramzan |
Identity-Based Aggregate Signatures. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Huafei Zhu, Feng Bao 0001 |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang 0002, Gady Agam, Ophir Frieder |
Document Image Retrieval using Signatures as Queries. |
DIAL |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang |
Ad Hoc Group Signatures. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
Toward the Fair Anonymous Signatures: Deniable Ring Signatures. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Xin-guang Zou, Sheng-He Sun |
Analysis of Anonymity on the Signatures of Knowledge. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Craig Gentry, David Molnar, Zulfikar Ramzan |
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Willy Susilo, Yi Mu 0001 |
On the Security of Nominative Signatures. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Patrick P. Tsang, Victor K. Wei |
Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Ardhendu Behera, Denis Lalanne, Rolf Ingold |
Enhancement of Layout-based Identification of Low-resolution Documents using Geometrical Color Distribution. |
ICDAR |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Dan Boneh, Ben Lynn, Hovav Shacham |
Short Signatures from the Weil Pairing. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Digital signatures, Elliptic curves, Pairings, Bilinear maps, Short signatures |
27 | Josef Pieprzyk, David Pointcheval |
Josef Pieprzyk, David Pointcheval. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, parallelization, Signcryption |
27 | Scott Campbell |
Supporting Digital Signatures in Mobile Environments. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Jaeil Lee, Taekyoung Kwon 0002, Sanghoon Song, JooSeok Song |
A Model for Embedding and Authorizing Digital Signatures in Printed Documents. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Practical Aspects, Computer Security, Distribute Systems Security |
27 | Douglas R. Stinson, Reto Strobl |
Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Niklas Borselius, Chris J. Mitchell, Aaron Wilson |
Undetachable Threshold Signatures. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Spyridoula M. Armeni, Dimitris Christodoulakis, Ioannis Kostopoulos, Polychronis D. Kountrias, Yannis C. Stamatiou, Michalis Nik Xenos |
An Information Hiding Method Based on Computational Intractable Problems. |
Panhellenic Conference on Informatics |
2001 |
DBLP DOI BibTeX RDF |
|
27 | N. W. P. van Diepen |
Implementation of Modular Algebraic Specifications. |
ESOP |
1988 |
DBLP DOI BibTeX RDF |
|
27 | Shruti Vyas, Aswin Sreedhar, Sandip Kundu |
TURBONFS: turbo nand flash search. |
ACM Great Lakes Symposium on VLSI |
2010 |
DBLP DOI BibTeX RDF |
signature, aliasing, NAND flash, MISR |
27 | Abdulkerim Çapar, Binnur Kurt, Muhittin Gökmen |
Gradient-based shape descriptors. |
Mach. Vis. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Shape signature, Content-based image retrieval, Shape, Shape descriptor |
27 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
How to Balance Privacy with Authenticity. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
universal designated verifier signature schemes, one time, non-transferability, privacy, authenticity |
27 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
short signature, Batch verification |
27 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack |
27 | Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt |
Key substitution attacks revisited: Taking into account malicious signers. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Key substitution, Cryptanalysis, Digital signature |
27 | YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won |
A PKI System for Detecting the Exposure of a User's Secret Key. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
key-insulated signature, one-time hash chain, NOVOMODO |
27 | Kaoru Kurosawa, Swee-Huay Heng |
The Power of Identification Schemes. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
trapdoor commitment scheme, on-line/off-line, signature scheme, Identification scheme, identity-based |
27 | Huafei Zhu, Feng Bao 0001 |
Stand-Alone and Setup-Free Verifiably Committed Signatures. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
Off-line fair-exchange, Setup-free, Stand-alone property, Verifiably committed signature |
27 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 |
The Fairness of Perfect Concurrent Signatures. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
security protocol, fair exchange, Concurrent signature |
27 | KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon |
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
Ad-hoc networks, Digital signature, Bilinear map, Diffie-Hellman problem |
27 | Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
On the Security of Probabilistic Multisignature Schemes and Their Optimality. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
Optimal security, Provable security, Random oracle model, Multisignature, Aggregate signature |
27 | Marc Girault, David Lefranc |
Server-Aided Verification: Theory and Practice. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
identification protocol, digital signature, zero-knowledge, discrete logarithm, pairing, non-repudiation, bilinear map, interactive proof |
27 | Yongdong Wu |
Aggregating signatures of MPEG-4 elementary streams. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
verification time, aggregated signature scheme, MPEG-4 elementary stream, authentic distribution, transmission overhead |
27 | SungJun Min, Go Yamamoto, Kwangjo Kim |
Weak Property of Malleability in NTRUSign. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
NTRUSign, Strong Existential Forgery, Centered Norm, Digital Signature Scheme, Malleability |
Displaying result #501 - #600 of 13353 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|