|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Siu-Kai Choy, Chong-Sze Tong |
Statistical Properties of Bit-Plane Probability Model and Its Application in Supervised Texture Classification. |
IEEE Trans. Image Process. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Basel Alomair, Krishna Sampigethaya, Radha Poovendran |
Efficient Generic Forward-Secure Signatures and Proxy Signatures. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
efficiency, Digital signatures, proxy, forward-security |
22 | Graham Cormode, Flip Korn, S. Muthukrishnan 0001, Yihua Wu |
On Signatures for Communication Graphs. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat, Julie Symons, Evgenia Smirni |
Analysis of application performance and its change via representative application signatures. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Luke Yen, Stark C. Draper, Mark D. Hill |
Notary: Hardware techniques to enhance signatures. |
MICRO |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Wiroonsak Santipach |
Asymptotic Performance of DS-CDMA with Linear MMSE Receiver and Limited Feedback. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
22 | N. R. Sunitha, B. B. Amberker |
A new method of verifying digital signatures in e-cheque processing. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Milena R. P. Souza, Leandro R. Almeida, George D. C. Cavalcanti |
Combining Distances through an Auto-Encoder Network to Verify Signatures. |
SBRN |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Simon Yiu, Robert Schober, Lutz H.-J. Lampe |
Decentralized Distributed Space-Time Trellis Coding. |
IEEE Trans. Wirel. Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Encarnación Castillo, Uwe Meyer-Bäse, Antonio García 0001, Luis Parrilla 0001, Antonio Lloris-Ruíz |
IPP@HDL: Efficient Intellectual Property Protection Scheme for IP Cores. |
IEEE Trans. Very Large Scale Integr. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
On-line/off-line signatures, Key exposure, Chameleon hashing |
22 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
22 | Gady Agam, Suneel Suresh |
Shape matching through particle dynamics warping. |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yang Cui 0001, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 |
Formal Security Treatments for Signatures from Identity-Based Encryption. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yannick Chevalier, Mounira Kourjieh |
Key Substitution in the Symbolic Analysis of Cryptographic Protocols. |
FSTTCS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Javier Herranz, Germán Sáez |
Distributed Ring Signatures from General Dual Access Structures. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
68P25, AMS Classification 94A60 |
22 | Michal Krátký, Václav Snásel, Jaroslav Pokorný, Pavel Zezula |
Efficient Processing of Narrow Range Queries in Multi-dimensional Data Structures. |
IDEAS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | David Galindo, Javier Herranz, Eike Kiltz |
On the Generic Construction of Identity-Based Signatures with Additional Properties. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron, Jean-Pierre Seifert |
Is It Wise to Publish Your Public RSA Keys? |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks |
22 | Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Aggelos Kiayias, Hong-Sheng Zhou |
Concurrent Blind Signatures Without Random Oracles. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hao-Tian Wu, Yiu-ming Cheung |
Public Authentication of 3D Mesh Models. |
Web Intelligence |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Melissa Chase, Anna Lysyanskaya |
On Signatures of Knowledge. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jeff Yan, Pook Leong Cho |
Enhancing Collaborative Spam Detection with Bloom Filters. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak |
Behavioral synthesis techniques for intellectual property protection. |
ACM Trans. Design Autom. Electr. Syst. |
2005 |
DBLP DOI BibTeX RDF |
watermarking, behavioral synthesis, Intellectual property protection |
22 | John Power, Miki Tanaka |
Binding Signatures for Generic Contexts. |
TLCA |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Thomas Pornin, Julien P. Stern |
Digital Signatures Do Not Guarantee Exclusive Ownership. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Aggelos Kiayias, Moti Yung |
Group Signatures with Efficient Concurrent Join. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Joseph K. Liu, Duncan S. Wong |
Linkable Ring Signatures: Security Models and New Schemes. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
22 | Shai Rubin, Somesh Jha, Barton P. Miller |
Language-Based Generation and Evaluation of NIDS Signatures. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Heiko Rossnagel, Denis Royer |
Making Money with Mobile Qualified Electronic Signatures. |
TrustBus |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk |
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham |
Sequential Aggregate Signatures from Trapdoor Permutations. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
22 | HyoJin Yoon, Jung Hee Cheon, Yongdae Kim |
Batch Verifications with ID-Based Signatures. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
ID-based signatures, Batch verifications |
22 | Charles L. Karr, Rodney Bowersox, Vishnu Singh |
Minimization of Sonic Boom on Supersonic Aircraft Using an Evolutionary Algorithm. |
GECCO |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Mohsen Ashourian, Yo-Sung Ho |
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk |
Authentication of Concast Communication. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Gene Itkis |
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Greg Maitland, Colin Boyd |
Co-operatively Formed Group Signatures. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang |
Abstraction-based intrusion detection in distributed environments. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
intrusion detection, heterogeneous systems, Cooperative information systems, misuse detection |
22 | David Naccache, David Pointcheval, Jacques Stern |
Twin signatures: an alternative to the hash-and-sign paradigm. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
flexible RSA problem, digital signatures, provable security, generic model, discrete logarithm, standard model |
22 | Ron Steinfeld, Laurence Bull, Yuliang Zheng 0001 |
Content Extraction Signatures. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
fragment-extraction, content blinding, fact verification, content verification, digital signatures, provable security, Content-extraction |
22 | Adam L. Young, Moti Yung |
Bandwidth-Optimal Kleptographic Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory |
22 | Kazuo Ohta, Tatsuaki Okamoto |
On Concrete Security Treatment of Signatures Derived from Identification. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Mohammed Fadle Abdulla, C. P. Ravikumar, Anshul Kumar |
A Novel BIST Architecture With Built-in Self Check. |
VLSI Design |
1996 |
DBLP DOI BibTeX RDF |
|
22 | Guevara Noubir, K. Vijayananda, Henri J. Nussbaumer |
A robust transport protocol for run-time fault detection. |
ICNP |
1995 |
DBLP DOI BibTeX RDF |
|
22 | David Chaum, Sandra Roijakkers |
Unconditionally Secure Digital Signatures. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
22 | Tatsuaki Okamoto, Kazuo Ohta |
How to Utilize the Randomness of Zero-Knowledge Proofs. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
22 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
22 | Antonia Azzini, Stefania Marrara, Meiko Jensen, Jörg Schwenk |
Extending the similarity-based XML multicast approach with digital signatures. |
SWS |
2009 |
DBLP DOI BibTeX RDF |
similarity-based aggregation, smp protocol, xml signature, xml similarity |
22 | Lei Zhang 0009, Qianhong Wu, Bo Qin |
Identity-Based Verifiably Encrypted Signatures without Random Oracles. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature |
22 | Ee-Chien Chang, Chee Liang Lim, Jia Xu 0006 |
Short Redactable Signatures Using Random Trees. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
Redactable Signature Scheme, Random Tree, Privacy |
22 | Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa |
On the Theoretical Gap between Group Signatures with and without Unlinkability. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
anonymity, group signature, unlinkability |
22 | Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern |
Cryptanalysis of ISO/IEC 9796-1. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
ISO/IEC 9796-1 signature standard, Rabin signatures, Cryptanalysis, Encoding scheme, RSA signatures |
22 | Peter Landrock |
New PKI Protocols Using Tamper Resistant Hardware. |
EuroPKI |
2008 |
DBLP DOI BibTeX RDF |
Practical PKI, Light weight digital signature, HSM |
22 | Yutao Zhong 0001, Wentao Chang |
Sampling-based program locality approximation. |
ISMM |
2008 |
DBLP DOI BibTeX RDF |
reuse signature, sampling, profiling, reuse distance, program locality |
22 | Sebastian Rohde, Thomas Eisenbarth 0001, Erik Dahmen, Johannes Buchmann 0001, Christof Paar |
Fast Hash-Based Signatures on Constrained Devices. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
hash based cryptography, Merkle signature scheme, digital signatures, Embedded security |
22 | Hahnsang Kim, Joshua Smith, Kang G. Shin |
Detecting energy-greedy anomalies and mobile malware variants. |
MobiSys |
2008 |
DBLP DOI BibTeX RDF |
power consumption history, power signature |
22 | Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam |
Improved Bounds on Security Reductions for Discrete Log Based Signatures. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Schnorr Signature Scheme, Provable Security, Random Oracle Model |
22 | Zuhua Shao |
Self-certified Signatures Based on Discrete Logarithms. |
WAIFI |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public key signature, Discrete logarithm, strong unforgeability |
22 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
22 | Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto |
Verifier-Key-Flexible Universal Designated-Verifier Signatures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
universal designated-verifier signature, verifier-key-flexible, random oracle, ECDSA |
22 | Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin |
Lightweight, pollution-attack resistant multicast authentication scheme. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
signature amortization, authentication, multicast, erasure code, pollution-attack |
22 | Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai |
Digitally signed document sanitizing scheme based on bilinear maps. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
digital signature, information disclosure, privacy issue |
22 | Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. |
WPES |
2006 |
DBLP DOI BibTeX RDF |
XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management |
22 | Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee |
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
Efficient Authentication, Simplified Certificate Status Management, Personal Area Network, One-Time Signature |
22 | Shidi Xu, Yi Mu 0001, Willy Susilo |
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Online/offline, Routing, MANET, signature, Multisignature |
22 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
22 | Olivier Billet, Henri Gilbert |
Cryptanalysis of Rainbow. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow |
22 | Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen |
Escrowed Linkability of Ring Signatures and Its Applications. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
pairings, ring signature, identity-based, linkability |
22 | Jingmei Liu, Xiangguo Cheng, Xinmei Wang |
Methods to Forge ElGamal Signatures and Determine Secret Key. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Signature, ElGamal |
22 | Zehui Wang, Zhiguo Zhang |
XTR + : A Provable Security Public Key Cryptosystem. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
Public key system, Trace function, IND-CCA2, Provable security, Blind signature, XTR |
22 | James A. Muir |
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
signature verification, fault analysis, RSA signatures, hardware faults |
22 | Chin-Chen Chang 0001, Iuon-Chang Lin |
An improvement of delegated multisignature scheme with document decomposition. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, multisignature |
22 | Pierre-Alain Fouque, Guillaume Poupard |
On the Security of RDSA. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
DSA variant, known-message attack, cryptanalysis, GPS, Signature scheme, lattice reduction |
22 | Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen |
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
binary anomalous curve, accelerated signature schemes, Elliptic curve, scalar multiplication, pseudo-random generators |
22 | Phong Q. Nguyen, Igor E. Shparlinski |
On the Insecurity of a Server-Aided RSA Protocol. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Server-aided protocol, Cryptanalysis, Lattices, RSA signature |
22 | Chih-Hsuan Tzeng, Wen-Hsiang Tsai |
A new technique for authentication of image/video for multimedia applications. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
JPEG/MPEG compression, compression tolerance, image/video authentication, digital signature |
22 | Marc Joye, Jean-Jacques Quisquater |
On Rabin-Type Signatures. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
Rabin-type systems, signature forgeries, digital signatures, factorization |
22 | Chuan-Kun Wu, Vijay Varadharajan |
Fair Exchange of Digital Signatures with Offline Trusted Third Party. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
Electronic commerce, Digital signature, Fair exchange |
22 | Paul Chang, Brion L. Keller, Sarala Paliwal |
Effective parallel processing techniques for the generation of test data for a logic built-in self test system. |
Asian Test Symposium |
2000 |
DBLP DOI BibTeX RDF |
logic built-in self test, complex processor, simulation time, random stimulus generation, signature computation, Pseudo-Random Pattern Generators, serial compression, response data, serial pattern dependency, parallel processing, parallel processing, logic testing, partitioning, built-in self test, integrated circuit testing, automatic test pattern generation, signatures, parallel simulation, microprocessor chips, logic simulation, logic simulation, post processing, logic partitioning, test data |
22 | Margus Freudenthal, Sven Heiberg, Jan Willemson |
Personal Security Environment on Palm PDA. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
personal security environment, Palm PDA, secret signing key, mobile computing device, smart-card reader, mobile security applications, device selection, private key handling, mobile computing, personal digital assistant, smart cards, personal computing, message authentication, microcomputer applications, digital signature schemes, design issues, notebook computers |
22 | Piero Olivo, Marcello Dalpasso |
A Bist Scheme for Non-Volatile Memories. |
J. Electron. Test. |
1998 |
DBLP DOI BibTeX RDF |
off-line testing, built-in self-test, signature analysis, non-volatile memories |
22 | Anne E. Gattiker, Wojciech Maly |
Current signatures [VLSI circuit testing]. |
VTS |
1996 |
DBLP DOI BibTeX RDF |
VLSI circuit testing, current signature, passive defects, active defects, VLSI, integrated circuit testing, CMOS integrated circuits, I/sub DDQ/ testing |
22 | O. Kebichi, Vyacheslav N. Yarmolik, Michael Nicolaidis |
Zero aliasing ROM BIST. |
J. Electron. Test. |
1994 |
DBLP DOI BibTeX RDF |
error cancellation, error masking, ROM BIST, Aliasing, signature analysis |
22 | Jan-Hendrik Evertse, Eugène van Heyst |
Which New RSA Signatures Can Be Computed From Some Given RSA Signatures? |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
RSA scheme, cryptographic protocol, RSA signature |
22 | Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi |
Secure Audio Teleconference. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
identification, signature, bridging, secrecy |
22 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
A Practical Provider Authentication System for Bidirectional Broadcast Service. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
provider authentication, bidirectional broadcasting, key-insulated signature, digital signature |
22 | Leonardo Guerreiro Azevedo, Ralf Hartmut Güting, Rafael Brand Rodrigues, Geraldo Zimbrão, Jano Moreira de Souza |
Filtering with raster signatures. |
GIS |
2006 |
DBLP DOI BibTeX RDF |
four-colors raster signature, multi-step query processor, raster approximation, three-colors raster signature, GIS, spatial databases, spatial join |
22 | Bob Blakley 0001, G. R. Blakley |
All sail, no anchor II: Acceptable high-end PKI. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation |
22 | Niklas Borselius, Chris J. Mitchell, Aaron Wilson |
On the value of threshold signatures. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
security, mobile agent, digital signature, threshold signature |
21 | Dimitrios Poulakis |
A variant of Digital Signature Algorithm. |
Des. Codes Cryptogr. |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
21 | Alireza Ahrary, Hui-ju Chiang, Sei-ichiro Kamata |
On-Line Signature Matching Based on Hilbert Scanning Patterns. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
Hilbert scanning patterns, Hilbert scanning distance, Gaussian mixture model |
21 | Juan Manuel Pascual-Gaspar, Valentín Cardeñoso-Payo, Carlos Vivaracho-Pascual |
Practical On-Line Signature Verification. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu 0002 |
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. |
Complex (1) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
|
|