|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | John M. Boyer |
Bulletproof business process automation: securing XML forms with document subset signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 104-111, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XFDL, XML signature transforms, secure XML forms, XForms |
27 | Henri Gilbert, Marine Minier |
Cryptanalysis of SFLASH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 288-298, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH |
27 | Chin-Chen Chang 0001, Ju Yuan Hsiao, Chi-Lung Chiang |
An Image Copyright Protection Scheme Based on Torus Automorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 1st International Symposium on Cyber Worlds (CW 2002), 6-8 November 2002, Tokyo, Japan, pp. 217-224, 2002, IEEE Computer Society, 0-7695-1862-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
torus automorphism, Watermark, digital signature |
27 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
Universal Padding Schemes for RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 226-241, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Probabilistic Signature Scheme, Provable Security |
27 | Hyo-Chang Nam, Jong Kim 0001, Sung Je Hong, Sunggu Lee |
Reliable Probabilistic Checkpointing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 16-17 December 1999, Hong Kong, pp. 153-160, 1999, IEEE Computer Society, 0-7695-0371-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Signature generation function, Performance analysis, Checkpointing, Aliasing, Failure recovery |
27 | Lawrence O'Gorman, Irina Rabinovich |
Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 20(10), pp. 1097-1102, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Document authentication, document image recognition, photo signature, photo-ID documents, ID cards, pattern recognition, cryptography, counterfeiting |
27 | Peter A. Moldovyanu, E. Dernova, A. Kostina, Nick A. Moldovyan |
Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IF&GIS ![In: Information Fusion and Geographic Information Systems, Proceedings of the Fourth International Workshop, IF&GIS 2009, 17-20 May 2009, St. Petersburg, Russia, pp. 331-341, 2009, Springer, 978-3-642-00303-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Collective digital signature, multisignature schemes, Digital signature, Public key, Finite group, Discrete logarithm problem |
27 | D. S. Guru, H. N. Prakash, T. N. Vikram |
Spatial Topology of Equitemporal Points on Signatures for Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PReMI ![In: Pattern Recognition and Machine Intelligence, Second International Conference, PReMI 2007, Kolkata, India, December 18-22, 2007, Proceedings, pp. 128-135, 2007, Springer, 978-3-540-77045-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Signature retrieval, Online Signature, Spatial similarity |
27 | Xiangxue Li, Dong Zheng 0001, Kefei Chen |
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 7th International Conference, ICA3PP 2007, Hangzhou, China, June 11-14, 2007, Proceedings, pp. 95-106, 2007, Springer, 978-3-540-72904-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
characteristic sequence, linkable ring signature, linear feedback shift-register, threshold signature |
27 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 207-219, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme |
27 | István Zsolt Berta, Levente Buttyán, István Vajda |
Mitigating the Untrusted Terminal Problem Using Conditional Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 12-16, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
untrusted terminal, conditional signature, smart card, message authentication, electronic signature |
27 | Ming-Der Shieh, Hsin-Fu Lo, Ming-Hwa Sheu |
High-speed generation of LFSR signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 9th Asian Test Symposium (ATS 2000), 4-6 December 2000, Taipei, Taiwan, pp. 222-, 2000, IEEE Computer Society, 0-7695-0887-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
high-speed generation, LFSR signatures, compaction simulation, single-input signature register, equivalent multiple-input implementation, finite field theory, high-speed signature computations, lookahead technique, internal-XOR LFSR, external-XOR LFSR, performance evaluation, logic testing, built-in self test, integrated circuit testing, automatic test pattern generation, BIST, linear feedback shift register, binary sequences, subsequences |
27 | Nirmal R. Saxena, Edward J. McCluskey |
Parallel Signatur Analysis Design with Bounds on Aliasing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 46(4), pp. 425-438, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
aliasing probability bounds, parallel signature designs, multiple input signature registers (MISR), linear feedback shift registers, random testing, Signature analysis |
27 | Shambhu J. Upadhyaya, Bina Ramamurthy |
Concurrent Process Monitoring with No Reference Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 43(4), pp. 475-480, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
concurrent process monitoring, signature technique, compilation phase, signature checking, controllable latency, branch-free interval, error coverage, sequencing errors, fault tolerant computing, controllability, program testing, signature analysis, control flow graph, error checking, bit errors, watchdog processor, error latency |
26 | Smita Krishnaswamy, Stephen Plaza, Igor L. Markov, John P. Hayes |
Signature-Based SER Analysis and Design of Logic Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(1), pp. 74-86, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jingran Wang, Haifeng Qian |
An Optimal Blind Signature Padding with Message Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 673-676, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu |
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 935-940, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka |
Yet Another Sanitizable Signature from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 941-946, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Kar Way Tan, Robert H. Deng |
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 67-74, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan Katz, Vinod Vaikuntanathan |
Signature Schemes with Bounded Leakage Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 703-720, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Danjun Pu, Gregory R. Ball, Sargur N. Srihari |
A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Third International Workshop, IWCF 2009, The Hague, The Netherlands, August 13-14, 2009. Proceedings, pp. 125-136, 2009, Springer, 978-3-642-03520-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jianhong Zhang, Hua Chen, Qin Geng |
Efficient and Provably Secure Self-certified Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMT ![In: Active Media Technology, 5th International Conference, AMT 2009, Beijing, China, October 22-24, 2009. Proceedings, pp. 501-512, 2009, Springer, 978-3-642-04874-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Enrique Argones-Rúa, David Pérez-Piñar López, José Luis Alba-Castro |
Ergodic HMM-UBM System for On-Line Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COST 2101/2102 Conference ![In: Biometric ID Management and Multimodal Communication, Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, September 16-18, 2009. Proceedings, pp. 340-347, 2009, Springer, 978-3-642-04390-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Giuseppe Pirlo, Donato Impedovo, Erasmo Stasolla, Claudia Adamita Trullo |
Learning Local Correspondences for Static Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI*IA ![In: AI*IA 2009: Emergent Perspectives in Artificial Intelligence, XIth International Conference of the Italian Association for Artificial Intelligence, Reggio Emilia, Italy, December 9-12, 2009, Proceedings, pp. 385-394, 2009, Springer, 978-3-642-10290-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum |
New Multiparty Signature Schemes for Network Routing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(1), pp. 3:1-3:39, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network security, digital signatures, pairings, identity-based signatures, multisignatures, aggregate signatures |
26 | Ismail A. Ismail, Mohammed A. Ramadan, Talaat El Danf, Ahmed H. Samak |
Automatic Signature Recognition and Verification Using Principal Components Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGIV ![In: Fifth International Conference on Computer Graphics, Imaging and Visualization: Modern Techniques and Applications, CGIV 2008, Penang, Malaysia, August 25-28, 2008, pp. 356-361, 2008, IEEE Computer Society, 978-0-7695-3359-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Xiaodong Lin 0001, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen |
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1530-1535, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Marcos Martinez-Diaz, Julian Fiérrez-Aguilar, Javier Galbally, Javier Ortega-Garcia |
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 19th International Conference on Pattern Recognition (ICPR 2008), December 8-11, 2008, Tampa, Florida, USA, pp. 1-5, 2008, IEEE Computer Society, 978-1-4244-2175-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu 0014 |
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 654-660, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Plantard, Willy Susilo, Khin Than Win |
A Digital Signature Scheme Based on CVPinfinity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 288-307, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern |
Total Break of the l-IC Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 1-17, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong |
Chained Threshold Proxy Signature without and with Supervision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 837-840, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Xuanwu Zhou, Ping Wei 0005 |
Anonymous Proxy Authorization Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 872-875, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Yanlin Qin, Xiaoping Wu |
Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 762-765, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Youan Xiao, Zude Zhou |
A New Kind of Self-Certified Proxy Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 766-769, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Mining Network Traffic for Worm Signature Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 4, pp. 327-331, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Emanuele Maiorana, Patrizio Campisi, Alessandro Neri 0001 |
Template Protection for On-Line Signature-Based Recognition Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIOID ![In: Biometrics and Identity Management, First European Workshop, BIOID 2008, Roskilde, Denmark, May 7-9, 2008. Revised Selected Papers, pp. 170-180, 2008, Springer, 978-3-540-89990-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Susanta Nanda, Tzi-cker Chiueh |
Execution Trace-Driven Automated Attack Signature Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 195-204, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kok Wai Wong, Tamás D. Gedeon, László T. Kóczy |
Fuzzy Signature and Cognitive Modelling for Complex Decision Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFSA (2) ![In: Theoretical Advances and Applications of Fuzzy Logic and Soft Computing, Selection of Papers from IFSA 2007, pp. 380-389, 2007, Springer, 978-3-540-72433-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Ping Han, Yanqin Zhu, Yuemei Hu |
Design of Multi-signature Scheme in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 247-251, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Efficient Certificateless Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 443-458, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Mehdi Salour, Xiao Su |
Dynamic Two-Layer Signature-Based IDS with Unequal Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 77-82, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 |
Identity-Based Proxy Signature from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 22-31, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Chengyu Hu, Daxing Li |
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 866-868, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Yong Li 0002, Huiyan Chen |
Efficient Identity-based Signature Scheme with Partial Message Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 883-888, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li |
Key-Insulated Group Signature Scheme with Selective Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1057-1063, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Vu Nguyen 0002, Michael Blumenstein, Vallipuram Muthukkumarasamy, Graham Leedham |
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 23-26 September, Curitiba, Paraná, Brazil, pp. 734-738, 2007, IEEE Computer Society, 978-0-7695-2822-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Haiyong Bao, Zhenfu Cao, Shengbao Wang |
Identity-Based Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, Third International Conference, TAMC 2006, Beijing, China, May 15-20, 2006, Proceedings, pp. 538-546, 2006, Springer, 3-540-34021-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Siyuan Chen, Sargur N. Srihari |
A New Off-line Signature Verification Method based on Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (2) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 869-872, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Stephane Armand, Michael Blumenstein, Vallipuram Muthukkumarasamy |
Off-line Signature Verification based on the Modified Direction Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 509-512, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Chik How Tan |
Public-Key Encryption from ID-Based Encryption Without One-Time Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 450-459, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear maps |
26 | Jiguo Li 0001, Yichen Zhang 0003, Zhijian Wang |
Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (1) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 480-483, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Alain Wahl, Jean Hennebert, Andreas Humm, Rolf Ingold |
Generation and Evaluation of Brute-Force Signature Forgeries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MRCS ![In: Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings, pp. 2-9, 2006, Springer, 3-540-39392-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Identity Based Key Insulated Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 226-234, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou |
Linkability of a Blind Signature Scheme and Its Improved Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV, pp. 262-270, 2006, Springer, 3-540-34077-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su |
Designated Verifier Proxy Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 40-47, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Zheng Gong, Xiangxue Li, Kefei Chen |
Efficient Partially Blind Signature Scheme with Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 12th Annual International Conference, COCOON 2006, Taipei, Taiwan, August 15-18, 2006, Proceedings, pp. 378-386, 2006, Springer, 3-540-36925-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Frederik Vanhaverbeke, Marc Moeneclaey |
Optimal signature sets for oversaturated quasi-scalable direct-sequence spread-spectrum systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 51(3), pp. 1136-1139, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | George N. Karystinos, Dimitrios A. Pados |
The maximum squared correlation, sum capacity, and total asymptotic efficiency of minimum total-squared-correlation binary signature sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 51(1), pp. 348-355, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Qibin Sun, Shih-Fu Chang |
A secure and robust digital signature scheme for JPEG2000 image authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(3), pp. 480-494, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 53-62, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | M. Wirotius, Jean-Yves Ramel, Nicole Vincent |
Distance and Matching for Authentication by On-Line Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AutoID ![In: Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 16-18 October 2005, Buffalo, NY, USA, pp. 230-235, 2005, IEEE Computer Society, 0-7695-2475-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Qin Wang, Zhenfu Cao, Shengbao Wang |
Formalized Security Model of Multi-Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 668-672, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jin Kim, Hyuk Cho, Eui Cha |
A Study on Enhanced Dynamic Signature Verification for the Embedded System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BVAI ![In: Brain, Vision, and Artificial Intelligence, First International Symposium, BVAI 2005, Naples, Italy, October 19-21, 2005, Proceedings, pp. 436-446, 2005, Springer, 3-540-29282-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Bon K. Sy |
Signature-Based Approach for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, 4th International Conference, MLDM 2005, Leipzig, Germany, July 9-11, 2005, Proceedings, pp. 526-536, 2005, Springer, 3-540-26923-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Cemil Öz |
Signature Recognition and Verification with Artificial Neural Network Using Moment Invariant Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, pp. 195-202, 2005, Springer, 3-540-25913-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Canan Senol, Tülay Yildirim |
Signature Verification Using Conic Section Function Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 524-532, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Xinge You, Bin Fang 0001, Zhenyu He 0001, Yuan Yan Tang |
Similarity Measurement for Off-Line Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I, pp. 272-281, 2005, Springer, 3-540-28226-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Hong-Wei Ji, Zhong-Hua Quan |
Signature Verification Using Wavelet Transform and Support Vector Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part I, pp. 671-678, 2005, Springer, 3-540-28226-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Farid Ahmed, Ira S. Moskowitz |
Composite signature based watermarking for fingerprint authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006, pp. 137-142, 2005, ACM, 1-59593-032-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Phasemark™, composite filter, phase only filter, watermarking, fingerprint, biometric authentication |
26 | Ching Yu Ng, Willy Susilo, Yi Mu 0001 |
Universal Designated Multi Verifier Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 305-309, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Chunxiang Gu, Yuefei Zhu |
Provable Security of ID-Based Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 1277-1286, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Duc-Liem Vo, Kwangjo Kim |
Yet Another Forward Secure Signature from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 441-455, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key evolution, pairings, Forward security, key exposure |
26 | Sung-Hyun Yun, Hyung-Woo Lee |
The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 391-400, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ray R. Hashemi, Joshua H. Early, Mahmood Bahar, Alexander A. Tyler, John F. Young |
A Signature-Based Liver Cancer Predictive System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 195-199, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Liver Cancer, Carcinogenic Potency Database, Self-organizing Map (SOM) and Hopfield Net, Predictive Systems |
26 | Shaohua Tang |
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 186-191, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Richard M. Guest, Michael C. Fairhurst, Claus Vielhauer |
Towards a Flexible Framework for Open Source Software for Handwritten Signature Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GfKl ![In: From Data and Information Analysis to Knowledge Engineering, Proceedings of the 29th Annual Conference of the Gesellschaft für Klassifikation e.V., University of Magdeburg, March 9-11, 2005, pp. 622-629, 2005, Springer, 978-3-540-31313-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Liang Wan, Bin Wan |
On-Line Signature Verification With Two-Stage Statistical Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Eighth International Conference on Document Analysis and Recognition (ICDAR 2005), 29 August - 1 September 2005, Seoul, Korea, pp. 282-286, 2005, IEEE Computer Society, 0-7695-2420-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Vanesa Daza, Javier Herranz, Germán Sáez |
Protocols useful on the Internet from distributed signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(2), pp. 61-69, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Distributed signatures, Metering schemes, Distributed key distribution schemes |
26 | Xian-Sheng Hua 0001, Xian Chen, HongJiang Zhang |
Robust video signature based on ordinal measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the 2004 International Conference on Image Processing, ICIP 2004, Singapore, October 24-27, 2004, pp. 685-688, 2004, IEEE, 0-7803-8554-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Javier Herranz, Germán Sáez |
Ring Signature Schemes for General Ad-Hoc Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 54-65, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ran Canetti, Oded Goldreich 0001, Shai Halevi |
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 40-57, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ran Canetti |
Universally Composable Signature, Certification, and Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 219-, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Qingshui Xue, Zhenfu Cao |
Improvement of Multi-Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 450-455, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Michael Backes 0001, Dennis Hofheinz |
How to Break and Repair a Universally Composable Signature Functionality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 61-72, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
A Ring Signature Scheme Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 160-169, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Robert Kofler, Robert Krimmer, Alexander Prosser, Martin Karl Unger |
The Role of Digital Signature Cards in Electronic Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi |
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 1-9, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems |
26 | Yung-Yuan Chen, Kun-Feng Chen |
Incorporating Signature-Monitoring Technique in VLIW Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 19th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2004), 10-13 October 2004, Cannes, France, Proceedings, pp. 395-402, 2004, IEEE Computer Society, 0-7695-2241-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | William D. Neumann |
HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 129-, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
r-time signatures, low power authentication, ad hoc wireless networks, hash chains, broadcast authentication |
26 | Jan Camenisch, Anna Lysyanskaya |
Signature Schemes and Anonymous Credentials from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 56-72, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Yuefei Zhu, Dan Xu |
An Efficient Key-Evolving Signature Scheme Based on Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 26-28 May 2004, Suzhou, China, pp. 68-73, 2004, IEEE Computer Society, 0-7695-2118-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Xin Lü, Dengguo Feng |
An Arbitrated Quantum Message Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 1054-1060, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Zhenchuan Chai, Zhenfu Cao |
Factoring-Based Proxy Signature Schemes with Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 1034-1040, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Guilin Wang, Jianying Zhou 0001, Robert H. Deng |
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 289-298, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
digital signatures, cryptographic protocols, undeniable signatures |
26 | Jonathan Katz, Nan Wang 0001 |
Efficiency improvements for signature schemes with tight security reductions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 155-164, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital signatures |
26 | Jacques Stern, Julien P. Stern |
Cryptanalysis of the OTM Signature Scheme from FC'02. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 138-148, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Josef Pieprzyk, Huaxiong Wang, Chaoping Xing |
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 88-100, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Heeyong Kwon, E. Y. Ha, H. Y. Hwang |
Online Signature Verification Based on Dynamic Feature Segmentation and 3-Step Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning, 4th International Conference, IDEAL 2003, Hong Kong, China, March 21-23, 2003, Revised Papers, pp. 1062-1065, 2003, Springer, 3-540-40550-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto |
A Fast Signature Scheme Based on New On-line Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 111-121, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 13353 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|