|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Nathan Carey, George M. Mohay, Andrew J. Clark |
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 245-254, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Andréa Vergara da Silva, Daniel Santana de Freitas |
Wavelet-Based Compared to Function-Based On-Line Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIBGRAPI ![In: 15th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2002), 7-10 October 2002, Fortaleza-CE, Brazil, pp. 218-, 2002, IEEE Computer Society, 0-7695-1846-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Jacques Stern, David Pointcheval, John Malone-Lee, Nigel P. Smart |
Flaws in Applying Proof Methodologies to Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 93-110, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Karina Toscano-Medina, Gabriel Sanchez-Perez, Mariko Nakano-Miyatake, Héctor M. Pérez Meana |
A Growing Cell Neural Network Structure for Off-Line Signature Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN (2) ![In: Bio-inspired Applications of Connectionism, 6th International Work-Conference on Artificial and Natural Neural Networks, IWANN 2001 Granada, Spain, June 13-15, 2001, Proceedings, Part II, pp. 192-199, 2001, Springer, 3-540-42237-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji |
Efficient "on the Fly" Signature Schemes Based on Integer Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 275-286, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Taik H. Rhee, Sung J. Cho, Jin-Ho Kim |
On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 10-13 September 2001, Seattle, WA, USA, pp. 645-649, 2001, IEEE Computer Society, 0-7695-1263-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Madasu Hanmandlu, K. R. Murali Mohan, Sourav Chakraborty 0002, Gaurav Garg II |
Fuzzy Modeling Based Signature Verification System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 10-13 September 2001, Seattle, WA, USA, pp. 110-115, 2001, IEEE Computer Society, 0-7695-1263-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng 0001, Hideki Imai |
Unconditionally Secure Digital Signature Schemes Admitting Transferability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 130-142, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Reihaneh Safavi-Naini, Willy Susilo |
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 292-307, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Jan Camenisch, Markus Michels |
Confirmer Signature Schemes Secure against Adaptive Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 243-258, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang |
Fail-Stop Signature for Long Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 165-177, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Wang-Chien Lee, Dik Lun Lee |
Signature caching techniques for information filtering in mobile environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 5(1), pp. 57-67, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Jeong-Ki Kim, Jae-Woo Chang |
VPSF: A Parallel Signature File Technique Using Vertical Partitioning and Extendable Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 10th International Conference, DEXA '99, Florence, Italy, August 30 - September 3, 1999, Proceedings, pp. 166-175, 1999, Springer, 3-540-66448-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Marc Joye, Seungjoo Kim, Narn-Yih Lee |
Cryptanalysis of Two Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 271-275, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Universal forgeries, Cryptanalysis, Digital signatures, Group signatures |
26 | Minli Yao, Yilin Wang, Qinye Yin 0001 |
Direction finding for multiuser correlated signals based on spatial signature estimation in cyclic cumulant domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30 - June 2, 1999, pp. 443-446, 1999, IEEE, 0-7803-5471-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Yoshiki Mizukami, Hidetoshi Miike, Mitsu Yoshimura, Isao Yoshimura |
An Off-line Signature Verification System using an Extraction Displacement Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Fifth International Conference on Document Analysis and Recognition, ICDAR 1999, 20-22 September, 1999, Bangalore, India, pp. 757-760, 1999, IEEE Computer Society, 0-7695-0318-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Cynthia Dwork, Moni Naor |
An Efficient Existentially Unforgeable Signature Scheme and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(3), pp. 187-208, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
One-way hash mbox{functions}, One-way hash mbox{functions}, Authentication, Authentication, Cryptography, Cryptography, Digital signatures, Digital signatures, Key words, Unforgeability, Unforgeability |
26 | Chae Hoon Lim, Pil Joong Lee |
A Study on the Proposed Korean Digital Signature Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 175-186, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jean-François Misarsky |
How (not) to Design RSA Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 14-28, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Dario Catalano, Rosario Gennaro |
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 105-120, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Ronny Martens, Luc J. M. Claesen |
Dynamic Programming Optimisation for On-line Signature Verificatio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 4th International Conference Document Analysis and Recognition (ICDAR '97), 2-Volume Set, August 18-20, 1997, Ulm, Germany, Proceedings, pp. 653-656, 1997, IEEE Computer Society, 0-8186-7898-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Kaisa Nyberg, Rainer A. Rueppel |
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 182-193, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
26 | Michael B. Monagan, Gaston H. Gonnet |
Signature Functions for Algebraic Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC '94, Oxford, UK, July 20-22, 1994, pp. 291-296, 1994, ACM, 0-89791-638-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
26 | Don Coppersmith, Jacques Stern, Serge Vaudenay |
Attacks on the Birational Permutation Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 435-443, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Dhiren Xavier, Robert C. Aitken, André Ivanov, Vinod K. Agarwal |
Using an asymmetric error model to study aliasing in signature analysis registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 11(1), pp. 16-25, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
26 | Atsushi Fujioka, Tatsuaki Okamoto, Shoji Miyaguchi |
ESIGN: An Efficient Digital Signature Implementation for Smard Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 446-457, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
26 | Yvo Desmedt, Moti Yung |
Weakness of Undeniable Signature Schemes (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 205-220, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
26 | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner |
A Remark on a Signature Scheme Where Forgery Can Be Proved. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 441-445, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
26 | Louis C. Guillou, Jean-Jacques Quisquater, Michael Walker 0001, Peter Landrock, Caroline Shafer |
Precautions Taken Against Various Potential Attacks in ISO/IEC DIS 9796 "Digital Signature Scheme Giving Message Recovery". ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 465-473, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
26 | André Ivanov, Vinod K. Agarwal |
An analysis of the probabilistic behavior of linear feedback signature registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 8(10), pp. 1074-1088, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Oded Goldreich 0001 |
Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 104-110, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
26 | Christian Beecks, Merih Seran Uysal, Thomas Seidl 0001 |
Signature Quadratic Form Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIVR ![In: Proceedings of the 9th ACM International Conference on Image and Video Retrieval, CIVR 2010, Xi'an, China, July 5-7, 2010, pp. 438-445, 2010, ACM, 978-1-4503-0117-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Signature Quadratic Form Distance, content-based similarity, feature signatures, multimedia information retrieval |
26 | Biao Wang, YingJue Fang, HongGang Lin, Yi Li |
The improved QV signature scheme based on conic curves over Z n . ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(4), pp. 602-608, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conic curve over ? n, low exponent attacks, KMOV, QV, digital signature, RSA |
26 | Julio Cesar Martínez Romo, Francisco Javier Luna Rosas, Miguel Mora-González |
On-Line Signature Verification Based on Genetic Optimization and Neural-Network-Driven Fuzzy Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2009: Advances in Artificial Intelligence, 8th Mexican International Conference on Artificial Intelligence, Guanajuato, Mexico, November 9-13, 2009. Proceedings, pp. 246-257, 2009, Springer, 978-3-642-05257-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
neural networks, GA, fuzzy reasoning, Signature verification |
26 | Juan Carlos Briceño, Carlos M. Travieso, Miguel A. Ferrer, Jesús B. Alonso, Jesús Francisco Vargas-Bonilla |
Angular Contour Parameterization for Signature Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST ![In: Computer Aided Systems Theory - EUROCAST 2009, 12th International Conference, Las Palmas de Gran Canaria, Spain, February 15-20, 2009, Revised Selected Papers, pp. 358-365, 2009, Springer, 978-3-642-04771-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Signature identification, Edge parameterization, Handwritten Writing, Pattern Recognition, Document analysis, Biometric system, Classification system |
26 | David Galindo, Flavio D. Garcia |
A Schnorr-Like Lightweight Identity-Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 135-148, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Schnorr, provable security, random oracle model, identity-based signature, lightweight cryptography |
26 | Youngho Park 0004, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee |
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILIGHT ![In: Mobile Lightweight Wireless Systems, First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers, pp. 35-44, 2009, Springer, 978-3-642-03818-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
key-insulated signature, security, authentication, anonymous, vehicular network |
26 | Donato Impedovo, Giuseppe Pirlo, Mario Refice |
Handwritten Signature and Speech: Preliminary Experiments on Multiple Source and Classifiers for Personal Identity Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings, pp. 181-191, 2008, Springer, 978-3-540-85302-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Biometry, Signature Verification, Speaker Verification, Personal Authentication, Multi-expert system |
26 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 176-184, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, provable security, forward security, key exposure |
26 | Shenghui Su, Yongquan Cai, Changxiang Shen |
The Banknote Anti-forgery System Based on Digital Signature Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 44-49, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-forgery, Preliminary design, Verification, Digital signature |
26 | Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong |
Identity-based signature scheme based on quadratic residues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 373-380, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proven security, factoring, random oracle, ID-based signature, quadratic residue |
26 | Li-Sha He, Ning Zhang 0001, Li-Rong He, Ian Rogers |
Secure M-commerce Transactions: A Third Party Based Signature Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 3-8, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
m-commerce security, signature delegation, digital signatures, cryptographic protocols |
26 | Se-Hoon Kim, Kie-Sung Oh, Hyung-Il Choi |
Off-Line Verification System of the Handwrite Signature or Text, Using a Dynamic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 1014-1023, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Verification, Dynamic Programming, Signature, Handwrite, Mahalanobis Distance, DTW, Off-line |
26 | Zhu Wang, Huiyan Chen |
A Practical Identity-Based Signature Scheme from Bilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 704-715, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID reduction, bilinear map, Identity-based signature, message recovery |
26 | Lei Zhang 0009, Futai Zhang, Fangguo Zhang |
New Efficient Certificateless Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 692-703, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
certificateless signature scheme, cryptography, bilinear map, random oracle model |
26 | Nick Pope, Juan Carlos Cruellas |
Oasis Digital Signature Services: Digital Signing without the Headaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 10(5), pp. 81-84, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DSS, digital signature, PKI, public-key infrastructure |
26 | Kaoru Kurosawa, Tsuyoshi Takagi |
New Approach for Selectively Convertible Undeniable Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 428-443, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
selective conversion, RSA, undeniable signature |
26 | Zhengjun Cao |
Analysis of One Popular Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 460-466, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
exculpability, anonymity, group signature |
26 | Toru Nakanishi 0001, Nobuo Funabiki |
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 17-32, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
backward unlinkability, DLDH assumption, group signature, revocation, bilinear maps |
26 | Fangguo Zhang, Xiaofeng Chen 0001, Willy Susilo, Yi Mu 0001 |
A New Signature Scheme Without Random Oracles from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 67-80, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Standard model, Random oracle, Short signature |
26 | Qibin Sun, Shih-Fu Chang |
A Robust and Secure Media Signature Scheme for JPEG Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 41(3), pp. 305-317, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
content hash, watermarking, digital signature, ECC, image authentication |
26 | Michael McIntosh, Paula Austel |
XML signature element wrapping attacks and countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005, pp. 20-27, 2005, ACM, 1-59593-234-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security policy, attack, vulnerability, web services security, countermeasure, XML signature |
26 | Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang |
Cryptanalysis of an efficient secure group signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 66-69, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, cryptanalysis, group signature, discrete logarithm |
26 | Toru Nakanishi 0001, Yuji Sugiyama |
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 336-347, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Membership revocation, Zero-knowledge proof of integer relations, Strong RSA assumption, Group signature scheme |
26 | Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio |
A New Key-Insulated Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 465-479, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
key-insulation, forward-security, signature schemes |
26 | John R. Cowell, Fiaz Hussain |
Amharic Character Recognition using a Fast Signature Based Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: Seventh International Conference on Information Visualization, IV 2003, 16-18 July 2003, London, UK, pp. 384-389, 2003, IEEE Computer Society, 0-7695-1988-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Amharic character recognition, character signature, optical character recognition, OCR, confusion matrix, structural recognition |
26 | Seung-Hyun Seo, Sang-Ho Lee |
A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human.Society@Internet 2003 ![In: Web Communication Technologies and Internet-Related Social Issues - HSI 2003, Second International Conference on Human Society@Internet, Seoul, Korea, June 18-20, 2003, Proceedings, pp. 527-536, 2003, Springer, 3-540-40456-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Multi-signature scheme, Mobile agent system |
26 | Mingfu Zou, Jianjun Tong, Changping Liu, Zhengliang Lou |
On-line Signature Verification Using Local Shape Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 7th International Conference on Document Analysis and Recognition (ICDAR 2003), 2-Volume Set, 3-6 August 2003, Edinburgh, Scotland, UK, pp. 314-318, 2003, IEEE Computer Society, 0-7695-1960-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Segmentation, Hidden Markov Model, Shape analysis, signature Verification, Biometric authentication |
26 | Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong |
Data mining aided signature discovery in network-based intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 36(4), pp. 7-13, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network-based intrusion detection, signature discovery, data mining, intrusion detection system |
26 | Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai |
An Anonymous Loan System Based on Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 244-256, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation |
26 | Mihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko |
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 309-328, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
Blind digital signature schemes, RSA, digital cash |
26 | Nicolas T. Courtois, Matthieu Finiasz, Nicolas Sendrier |
How to Achieve a McEliece-Based Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 157-174, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Niederreiter cryptosystem, digital signature, short signatures, syndrome decoding, McEliece cryptosystem, Goppa codes |
26 | Zi-Chen Li, Jun-Mei Zhang, Jun Luo, William Song, Yi-Qi Dai |
Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISEC ![In: Topics in Electronic Commerce, Second International Symposium, ISEC 2001 Hong Kong, China, April 26-28, 2001, Proceedings, pp. 57-69, 2001, Springer, 3-540-41963-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Threshold digital signature, Information security, Traceable |
26 | Marco Ottavi, Gian Carlo Cardarilli, D. Cellitti, Salvatore Pontarelli, Marco Re, Adelio Salsano |
Design of a Totally Self Checking Signature Analysis Checker for Finite State Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 16th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2001), 24-26 October 2001, San Francisco, CA, USA, Proceedings, pp. 403-411, 2001, IEEE Computer Society, 0-7695-1203-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
SSMM, fault tolerance, finite state machine, VHDL, signature analysis, self checking |
26 | Mohammed Fadle Abdulla, C. P. Ravikumar, Anshul Kumar |
Built-in Self Test Based on Multiple On-Chip Signature Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 14(3), pp. 227-244, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
multiple signature comparison testing, BIST, aliasing probability |
26 | Eugenio Calabi, Peter J. Olver, Chehrzad Shakiban, Allen R. Tannenbaum, Steven Haker |
Differential and Numerically Invariant Signature Curves Applied to Object Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 26(2), pp. 107-135, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
joint invariant, signature curve, Euclidean group, equi-affine group, curve shortening flow, object recognition, snake, differential invariant, symmetry group, numerical approximation |
26 | Markus Michels, Markus Stadler, Hung-Min Sun |
On the Security of Some Variants of the RSA Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 85-96, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
RSA variants, cryptanalysis, digital signature schemes |
26 | Michael Gössel, Egor S. Sogomonyan |
A parity-preserving multi-input signature analyzer and its application for concurrent checking and BIST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 8(2), pp. 165-177, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
parity-preserving signature analyzer, built-in-self-test, concurrent error detection, on-line testing |
26 | Seong Hoon Kim, Myoung Soo Park, Jaihie Kim |
Applying personalized weights to a feature set for on-line signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume II, pp. 882-885, 1995, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
personalized weights, pen-speed, pen-pressure, optimal verification, combinatorial efforts, handwriting recognition, on-line signature verification |
26 | Luan Ling Lee |
Neural approaches for human signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume II, pp. 1055-1058, 1995, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
neural approaches, human signature verification, Bayes multilayer perceptrons, input-oriented neural networks, network training, instantaneous absolute velocity, spatial coordinate time functions, misclassification error rate, multilayer perceptrons, time-delay neural networks, backpropagation algorithm |
26 | Ziming Song, Chunqing Wu, Zhu Tang |
An Efficient Group Signature Scheme in Ferry-Based Delay-Tolerant Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 2816-2821, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Ferry, Signature of Knowledge (SoK), DTN, Group signature, Forward-security |
26 | Mohamed Abbas, Kwang-Ting Cheng, Yasuo Furukawa, Satoshi Komatsu, Kunihiro Asada |
Signature-Based Testing for Digitally-Assisted Adaptive Equalizers in High-Speed Serial Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETS ![In: 14th IEEE European Test Symposium, ETS 2009, Sevilla, Spain, May 25-29, 2009, pp. 107-112, 2009, IEEE Computer Society, 978-0-7695-3703-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
digitally-assisted adaptive equalizers, static signature-based testing, dynamic signature-based testing |
26 | Bin Sun, Wang Chuan, Jiang Li 0009, Legand L. Burge III |
A Multi-Signature Scheme Based on Two Difficult Mathematics Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 350-355, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, digital signature, RSA, ElGamal, multi-signature |
26 | Hirokazu Miyata, Ryuya Uda, Ken-ichi Okada |
The Efficiency Method of Sanitizable Signature Scheme for SMF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: The IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, United Kingdom, May 26-29, 2009, pp. 495-502, 2009, IEEE Computer Society, 978-0-7695-3638-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SMF, Sanitizable Signature Scheme, Digital Signature, MIDI |
26 | Yanguang Shen, Hui Xie, Sheping Hao, Wei Wang |
A Dynamic Group Blind Signature Scheme Based on Elliptic Curve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (1) ![In: PACIIA 2008, Volume 1, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 781-784, 2008, IEEE Computer Society, 978-0-7695-3490-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Dynamic group blind signature, Knowledge signature, Elliptic curve |
26 | Maithili Narasimha, Gene Tsudik |
DSAC: integrity for outsourced databases with signature aggregation and chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 235-236, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
integrity and authenticity, signature aggregation, digital signature, schemes, data outsourcing |
26 | Sung-Ming Yen, Chi-Sung Laih |
Improved Digital Signature Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 44(5), pp. 729-730, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Digital Signature Algorithm (DSA), Data integrity, digital signature, public-key cryptography, modular exponentiation, modular inverse |
26 | Shou-ping Feng, Toru Fujiwara, Tadao Kasami, Kazuhiko Iwasaki |
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 44(11), pp. 1265-1274, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
single input signature register, signature analysis, Hamming code, Aliasing probability, BCH code, weight distribution |
26 | D. Lambidonis, Vinod K. Agarwal, André Ivanov, Dhiren Xavier |
A quasi-optimal scheduling of intermediate signatures for multiple signature analysis compaction testing schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 6(1), pp. 75-84, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
compact testing, multiple signature analysis, Built-in self-test, fault simulation, fault coverage, signature analysis |
26 | Mark G. Karpovsky, Lev B. Levitin, Feodor S. Vainstein |
Diagnosis by Signature Analysis of Test Responses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 43(2), pp. 141-152, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
faulty processing elements, compressed test response, space-time signature, hard decision decoding, space-time compression, parallel processing, fault tolerant computing, logic testing, fault location, array processors, signature analysis, test responses |
26 | Nirmal R. Saxena, Piero Franco, Edward J. McCluskey |
Simple Bounds on Serial Signature Analysis Aliasing for Random Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 41(5), pp. 638-645, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
serial signature analysis aliasing, signature polynomial, simple bounds, linear cellular automaton, intermediate signatures, computational complexity, logic testing, probability, integrated circuit testing, random testing, finite automata, aliasing probability, linear finite state machine |
26 | Maurizio Damiani, Piero Olivo, Bruno Riccò |
Analysis and Design of Linear Finite State Machines for Signature Analysis Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 40(9), pp. 1034-1045, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
signature analysis testing, aliasing error probability, logic testing, finite automata, signature analysis, linear finite state machines |
26 | William H. McAnney, Jacob Savir |
Built-In Checking of the Correct Self-Test Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 37(9), pp. 1142-1145, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
self-test signature, initial value, signature register, single observation, logic testing, automatic testing, built-in testing |
25 | Xiaoting Sun, Xiaodong Lin 0001, Pin-Han Ho |
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1539-1545, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Rui Zhang 0002, Jun Furukawa 0001, Hideki Imai |
Short Signature and Universal Designated Verifier Signature Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 483-498, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Jing Yang, Yunfu Tang, Qunbo Zhou, Chuanjie Jin |
A Security Enhanced Blockchain System Supporting Standard Elliptic Curve Digital Signature Algorithm Signature (ECDSA) and SM2 Signature Simultaneously. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EITCE ![In: EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22 - 24, 2021, pp. 521-525, 2021, ACM, 978-1-4503-8432-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Shaohua Tang, Jiahui Chen 0002, Lingling Xu, Xiaoyu Li |
MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 877, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
24 | Jun Zhang |
An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 6(8), pp. 1238-1245, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSA ![In: Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings, pp. 270-279, 2010, Springer, 978-3-642-14477-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Banshidhar Majhi, Deepak Kumar Sahu, RamNarayan Subudhi |
An Efficient ID Based Proxy Signature, Proxy Blind Signature and Proxy Partial Blind Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 2008 International Conference on Information Technology, ICIT '08, Bhubaneswar, India, December 17-20, 2008, pp. 19-23, 2008, IEEE Computer Society, 978-1-4244-3745-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Xiangxue Li, Kefei Chen |
ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 169(1), pp. 437-450, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Nazar Elfadil |
Graphical and Digital signature Combination for fulfilling the cultural gap between traditional signature and current smart card digital certificate/signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Third Annual Conference on Privacy, Security and Trust, October 12-14, 2005, The Fairmont Algonquin, St. Andrews, New Brunswick, Canada, Proceedings, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
24 | Fangguo Zhang, Reihaneh Safavi-Naini, Chih-Yin Lin |
New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 104, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Alexandra Boldyreva |
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 118, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
22 | Adam Bender, Jonathan Katz, Ruggero Morselli |
Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(1), pp. 114-138, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Anonymity, Signatures |
22 | Baihua Zheng, Wang-Chien Lee, Peng Liu 0005, Dik Lun Lee, Xuhua Ding |
Tuning On-Air Signatures for Balancing Performance and Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 21(12), pp. 1783-1797, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 378-397, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
22 | Laila El Aimani |
On Generic Constructions of Designated Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 343-362, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction |
22 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(8), pp. 3631-3646, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha |
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(4), pp. 224-241, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
|
|