The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Signature with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1971-1980 (15) 1981-1982 (15) 1983-1984 (35) 1985-1986 (30) 1987 (19) 1988 (44) 1989 (43) 1990 (65) 1991 (49) 1992 (54) 1993 (67) 1994 (83) 1995 (90) 1996 (115) 1997 (126) 1998 (144) 1999 (181) 2000 (185) 2001 (254) 2002 (286) 2003 (409) 2004 (613) 2005 (727) 2006 (689) 2007 (770) 2008 (753) 2009 (654) 2010 (394) 2011 (422) 2012 (397) 2013 (450) 2014 (440) 2015 (431) 2016 (424) 2017 (444) 2018 (470) 2019 (570) 2020 (563) 2021 (534) 2022 (544) 2023 (576) 2024 (179)
Publication types (Num. hits)
article(5596) book(4) data(6) incollection(100) inproceedings(7574) phdthesis(73)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5777 occurrences of 2201 keywords

Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Siu-Kai Choy, Chong-Sze Tong Statistical Properties of Bit-Plane Probability Model and Its Application in Supervised Texture Classification. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Basel Alomair, Krishna Sampigethaya, Radha Poovendran Efficient Generic Forward-Secure Signatures and Proxy Signatures. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF efficiency, Digital signatures, proxy, forward-security
22Graham Cormode, Flip Korn, S. Muthukrishnan 0001, Yihua Wu On Signatures for Communication Graphs. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat, Julie Symons, Evgenia Smirni Analysis of application performance and its change via representative application signatures. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Luke Yen, Stark C. Draper, Mark D. Hill Notary: Hardware techniques to enhance signatures. Search on Bibsonomy MICRO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Wiroonsak Santipach Asymptotic Performance of DS-CDMA with Linear MMSE Receiver and Limited Feedback. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22N. R. Sunitha, B. B. Amberker A new method of verifying digital signatures in e-cheque processing. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Milena R. P. Souza, Leandro R. Almeida, George D. C. Cavalcanti Combining Distances through an Auto-Encoder Network to Verify Signatures. Search on Bibsonomy SBRN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Simon Yiu, Robert Schober, Lutz H.-J. Lampe Decentralized Distributed Space-Time Trellis Coding. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Encarnación Castillo, Uwe Meyer-Bäse, Antonio García 0001, Luis Parrilla 0001, Antonio Lloris-Ruíz IPP@HDL: Efficient Intellectual Property Protection Scheme for IP Cores. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-line/off-line signatures, Key exposure, Chameleon hashing
22Fabien Laguillaumie, Damien Vergnaud On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures
22Gady Agam, Suneel Suresh Shape matching through particle dynamics warping. Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yang Cui 0001, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 Formal Security Treatments for Signatures from Identity-Based Encryption. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yannick Chevalier, Mounira Kourjieh Key Substitution in the Symbolic Analysis of Cryptographic Protocols. Search on Bibsonomy FSTTCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Javier Herranz, Germán Sáez Distributed Ring Signatures from General Dual Access Structures. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 68P25, AMS Classification 94A60
22Michal Krátký, Václav Snásel, Jaroslav Pokorný, Pavel Zezula Efficient Processing of Narrow Range Queries in Multi-dimensional Data Structures. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22David Galindo, Javier Herranz, Eike Kiltz On the Generic Construction of Identity-Based Signatures with Additional Properties. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Shay Gueron, Jean-Pierre Seifert Is It Wise to Publish Your Public RSA Keys? Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks
22Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Aggelos Kiayias, Hong-Sheng Zhou Concurrent Blind Signatures Without Random Oracles. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Hao-Tian Wu, Yiu-ming Cheung Public Authentication of 3D Mesh Models. Search on Bibsonomy Web Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Melissa Chase, Anna Lysyanskaya On Signatures of Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Jeff Yan, Pook Leong Cho Enhancing Collaborative Spam Detection with Bloom Filters. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak Behavioral synthesis techniques for intellectual property protection. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF watermarking, behavioral synthesis, Intellectual property protection
22John Power, Miki Tanaka Binding Signatures for Generic Contexts. Search on Bibsonomy TLCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Thomas Pornin, Julien P. Stern Digital Signatures Do Not Guarantee Exclusive Ownership. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Aggelos Kiayias, Moti Yung Group Signatures with Efficient Concurrent Join. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Joseph K. Liu, Duncan S. Wong Linkable Ring Signatures: Security Models and New Schemes. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Lan Nguyen Accumulators from Bilinear Pairings and Applications. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators
22Shai Rubin, Somesh Jha, Barton P. Miller Language-Based Generation and Evaluation of NIDS Signatures. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Heiko Rossnagel, Denis Royer Making Money with Mobile Qualified Electronic Signatures. Search on Bibsonomy TrustBus The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham Sequential Aggregate Signatures from Trapdoor Permutations. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22HyoJin Yoon, Jung Hee Cheon, Yongdae Kim Batch Verifications with ID-Based Signatures. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-based signatures, Batch verifications
22Charles L. Karr, Rodney Bowersox, Vishnu Singh Minimization of Sonic Boom on Supersonic Aircraft Using an Evolutionary Algorithm. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Mohsen Ashourian, Yo-Sung Ho Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk Authentication of Concast Communication. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Gene Itkis Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Greg Maitland, Colin Boyd Co-operatively Formed Group Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang Abstraction-based intrusion detection in distributed environments. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF intrusion detection, heterogeneous systems, Cooperative information systems, misuse detection
22David Naccache, David Pointcheval, Jacques Stern Twin signatures: an alternative to the hash-and-sign paradigm. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF flexible RSA problem, digital signatures, provable security, generic model, discrete logarithm, standard model
22Ron Steinfeld, Laurence Bull, Yuliang Zheng 0001 Content Extraction Signatures. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fragment-extraction, content blinding, fact verification, content verification, digital signatures, provable security, Content-extraction
22Adam L. Young, Moti Yung Bandwidth-Optimal Kleptographic Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory
22Kazuo Ohta, Tatsuaki Okamoto On Concrete Security Treatment of Signatures Derived from Identification. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Mohammed Fadle Abdulla, C. P. Ravikumar, Anshul Kumar A Novel BIST Architecture With Built-in Self Check. Search on Bibsonomy VLSI Design The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
22Guevara Noubir, K. Vijayananda, Henri J. Nussbaumer A robust transport protocol for run-time fault detection. Search on Bibsonomy ICNP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
22David Chaum, Sandra Roijakkers Unconditionally Secure Digital Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
22Tatsuaki Okamoto, Kazuo Ohta How to Utilize the Randomness of Zero-Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
22Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh Automatic Generation of String Signatures for Malware Detection. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation
22Antonia Azzini, Stefania Marrara, Meiko Jensen, Jörg Schwenk Extending the similarity-based XML multicast approach with digital signatures. Search on Bibsonomy SWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF similarity-based aggregation, smp protocol, xml signature, xml similarity
22Lei Zhang 0009, Qianhong Wu, Bo Qin Identity-Based Verifiably Encrypted Signatures without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature
22Ee-Chien Chang, Chee Liang Lim, Jia Xu 0006 Short Redactable Signatures Using Random Trees. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Redactable Signature Scheme, Random Tree, Privacy
22Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa On the Theoretical Gap between Group Signatures with and without Unlinkability. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, group signature, unlinkability
22Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern Cryptanalysis of ISO/IEC 9796-1. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ISO/IEC 9796-1 signature standard, Rabin signatures, Cryptanalysis, Encoding scheme, RSA signatures
22Peter Landrock New PKI Protocols Using Tamper Resistant Hardware. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Practical PKI, Light weight digital signature, HSM
22Yutao Zhong 0001, Wentao Chang Sampling-based program locality approximation. Search on Bibsonomy ISMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reuse signature, sampling, profiling, reuse distance, program locality
22Sebastian Rohde, Thomas Eisenbarth 0001, Erik Dahmen, Johannes Buchmann 0001, Christof Paar Fast Hash-Based Signatures on Constrained Devices. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash based cryptography, Merkle signature scheme, digital signatures, Embedded security
22Hahnsang Kim, Joshua Smith, Kang G. Shin Detecting energy-greedy anomalies and mobile malware variants. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF power consumption history, power signature
22Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam Improved Bounds on Security Reductions for Discrete Log Based Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Schnorr Signature Scheme, Provable Security, Random Oracle Model
22Zuhua Shao Self-certified Signatures Based on Discrete Logarithms. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-certified public key signature, Discrete logarithm, strong unforgeability
22Qiong Ren, Yi Mu 0001, Willy Susilo SEFAP: An Email System for Anti-Phishing. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious Email, Digital Signature, Anti-Phishing
22Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto Verifier-Key-Flexible Universal Designated-Verifier Signatures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF universal designated-verifier signature, verifier-key-flexible, random oracle, ECDSA
22Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin Lightweight, pollution-attack resistant multicast authentication scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature amortization, authentication, multicast, erasure code, pollution-attack
22Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai Digitally signed document sanitizing scheme based on bilinear maps. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signature, information disclosure, privacy issue
22Jan Camenisch, Thomas Gross 0001, Dieter Sommer Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management
22Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Efficient Authentication, Simplified Certificate Status Management, Personal Area Network, One-Time Signature
22Shidi Xu, Yi Mu 0001, Willy Susilo Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline, Routing, MANET, signature, Multisignature
22Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi Trusted-link: web-link enhancement for integrity and trustworthiness. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrity, web, signature, link, trustworthiness
22Olivier Billet, Henri Gilbert Cryptanalysis of Rainbow. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow
22Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen Escrowed Linkability of Ring Signatures and Its Applications. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF pairings, ring signature, identity-based, linkability
22Jingmei Liu, Xiangguo Cheng, Xinmei Wang Methods to Forge ElGamal Signatures and Determine Secret Key. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Signature, ElGamal
22Zehui Wang, Zhiguo Zhang XTR + : A Provable Security Public Key Cryptosystem. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key system, Trace function, IND-CCA2, Provable security, Blind signature, XTR
22James A. Muir Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature verification, fault analysis, RSA signatures, hardware faults
22Chin-Chen Chang 0001, Iuon-Chang Lin An improvement of delegated multisignature scheme with document decomposition. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptography, digital signature, multisignature
22Pierre-Alain Fouque, Guillaume Poupard On the Security of RDSA. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DSA variant, known-message attack, cryptanalysis, GPS, Signature scheme, lattice reduction
22Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF binary anomalous curve, accelerated signature schemes, Elliptic curve, scalar multiplication, pseudo-random generators
22Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
22Chih-Hsuan Tzeng, Wen-Hsiang Tsai A new technique for authentication of image/video for multimedia applications. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF JPEG/MPEG compression, compression tolerance, image/video authentication, digital signature
22Marc Joye, Jean-Jacques Quisquater On Rabin-Type Signatures. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Rabin-type systems, signature forgeries, digital signatures, factorization
22Chuan-Kun Wu, Vijay Varadharajan Fair Exchange of Digital Signatures with Offline Trusted Third Party. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Electronic commerce, Digital signature, Fair exchange
22Paul Chang, Brion L. Keller, Sarala Paliwal Effective parallel processing techniques for the generation of test data for a logic built-in self test system. Search on Bibsonomy Asian Test Symposium The full citation details ... 2000 DBLP  DOI  BibTeX  RDF logic built-in self test, complex processor, simulation time, random stimulus generation, signature computation, Pseudo-Random Pattern Generators, serial compression, response data, serial pattern dependency, parallel processing, parallel processing, logic testing, partitioning, built-in self test, integrated circuit testing, automatic test pattern generation, signatures, parallel simulation, microprocessor chips, logic simulation, logic simulation, post processing, logic partitioning, test data
22Margus Freudenthal, Sven Heiberg, Jan Willemson Personal Security Environment on Palm PDA. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF personal security environment, Palm PDA, secret signing key, mobile computing device, smart-card reader, mobile security applications, device selection, private key handling, mobile computing, personal digital assistant, smart cards, personal computing, message authentication, microcomputer applications, digital signature schemes, design issues, notebook computers
22Piero Olivo, Marcello Dalpasso A Bist Scheme for Non-Volatile Memories. Search on Bibsonomy J. Electron. Test. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF off-line testing, built-in self-test, signature analysis, non-volatile memories
22Anne E. Gattiker, Wojciech Maly Current signatures [VLSI circuit testing]. Search on Bibsonomy VTS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF VLSI circuit testing, current signature, passive defects, active defects, VLSI, integrated circuit testing, CMOS integrated circuits, I/sub DDQ/ testing
22O. Kebichi, Vyacheslav N. Yarmolik, Michael Nicolaidis Zero aliasing ROM BIST. Search on Bibsonomy J. Electron. Test. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF error cancellation, error masking, ROM BIST, Aliasing, signature analysis
22Jan-Hendrik Evertse, Eugène van Heyst Which New RSA Signatures Can Be Computed From Some Given RSA Signatures? Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF RSA scheme, cryptographic protocol, RSA signature
22Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi Secure Audio Teleconference. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF identification, signature, bridging, secrecy
22Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai A Practical Provider Authentication System for Bidirectional Broadcast Service. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF provider authentication, bidirectional broadcasting, key-insulated signature, digital signature
22Leonardo Guerreiro Azevedo, Ralf Hartmut Güting, Rafael Brand Rodrigues, Geraldo Zimbrão, Jano Moreira de Souza Filtering with raster signatures. Search on Bibsonomy GIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF four-colors raster signature, multi-step query processor, raster approximation, three-colors raster signature, GIS, spatial databases, spatial join
22Bob Blakley 0001, G. R. Blakley All sail, no anchor II: Acceptable high-end PKI. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation
22Niklas Borselius, Chris J. Mitchell, Aaron Wilson On the value of threshold signatures. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, mobile agent, digital signature, threshold signature
21Dimitrios Poulakis A variant of Digital Signature Algorithm. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
21Alireza Ahrary, Hui-ju Chiang, Sei-ichiro Kamata On-Line Signature Matching Based on Hilbert Scanning Patterns. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hilbert scanning patterns, Hilbert scanning distance, Gaussian mixture model
21Juan Manuel Pascual-Gaspar, Valentín Cardeñoso-Payo, Carlos Vivaracho-Pascual Practical On-Line Signature Verification. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu 0002 Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Wei Yan, Erik Wu Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. Search on Bibsonomy Complex (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network security, cloud computing, malware, anti-virus
Displaying result #801 - #900 of 13353 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license