|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Siu-Kai Choy, Chong-Sze Tong |
Statistical Properties of Bit-Plane Probability Model and Its Application in Supervised Texture Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 17(8), pp. 1399-1405, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Basel Alomair, Krishna Sampigethaya, Radha Poovendran |
Efficient Generic Forward-Secure Signatures and Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 166-181, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
efficiency, Digital signatures, proxy, forward-security |
22 | Graham Cormode, Flip Korn, S. Muthukrishnan 0001, Yihua Wu |
On Signatures for Communication Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 189-198, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Ningfang Mi, Ludmila Cherkasova, Kivanc M. Ozonat, Julie Symons, Evgenia Smirni |
Analysis of application performance and its change via representative application signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 216-223, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Luke Yen, Stark C. Draper, Mark D. Hill |
Notary: Hardware techniques to enhance signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 41st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-41 2008), November 8-12, 2008, Lake Como, Italy, pp. 234-245, 2008, IEEE Computer Society, 978-1-4244-2836-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Wiroonsak Santipach |
Asymptotic Performance of DS-CDMA with Linear MMSE Receiver and Limited Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1393-1397, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 121-140, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | N. R. Sunitha, B. B. Amberker |
A new method of verifying digital signatures in e-cheque processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Milena R. P. Souza, Leandro R. Almeida, George D. C. Cavalcanti |
Combining Distances through an Auto-Encoder Network to Verify Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBRN ![In: 10th Brazilian Symposium on Neural Networks (SBRN 2008), Salvador, Bahia, Brazil, October 26-30, 2008, pp. 63-68, 2008, IEEE Computer Society, 978-0-7695-3361-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Simon Yiu, Robert Schober, Lutz H.-J. Lampe |
Decentralized Distributed Space-Time Trellis Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 6(11), pp. 3985-3993, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Encarnación Castillo, Uwe Meyer-Bäse, Antonio García 0001, Luis Parrilla 0001, Antonio Lloris-Ruíz |
IPP@HDL: Efficient Intellectual Property Protection Scheme for IP Cores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 15(5), pp. 578-591, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 18-30, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
On-line/off-line signatures, Key exposure, Chameleon hashing |
22 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 175-188, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
22 | Gady Agam, Suneel Suresh |
Shape matching through particle dynamics warping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yang Cui 0001, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 |
Formal Security Treatments for Signatures from Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 218-227, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yannick Chevalier, Mounira Kourjieh |
Key Substitution in the Symbolic Analysis of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSTTCS ![In: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings, pp. 121-132, 2007, Springer, 978-3-540-77049-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Javier Herranz, Germán Sáez |
Distributed Ring Signatures from General Dual Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(1), pp. 103-120, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
68P25, AMS Classification 94A60 |
22 | Michal Krátký, Václav Snásel, Jaroslav Pokorný, Pavel Zezula |
Efficient Processing of Narrow Range Queries in Multi-dimensional Data Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 11-14 December 2006, Delhi, India, pp. 69-79, 2006, IEEE Computer Society, 0-7695-2577-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | David Galindo, Javier Herranz, Eike Kiltz |
On the Generic Construction of Identity-Based Signatures with Additional Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 178-193, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron, Jean-Pierre Seifert |
Is It Wise to Publish Your Public RSA Keys? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fault Diagnosis and Tolerance in Cryptography, Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, pp. 1-12, 2006, Springer, 3-540-46250-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authenticated computing, Hardware attacks, Secure/Trusted boot, RSA, Fault attacks |
22 | Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 63-77, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Aggelos Kiayias, Hong-Sheng Zhou |
Concurrent Blind Signatures Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 49-62, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Hao-Tian Wu, Yiu-ming Cheung |
Public Authentication of 3D Mesh Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 18-22 December 2006, Hong Kong, China, pp. 940-948, 2006, IEEE Computer Society, 0-7695-2747-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Melissa Chase, Anna Lysyanskaya |
On Signatures of Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 78-96, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jeff Yan, Pook Leong Cho |
Enhancing Collaborative Spam Detection with Bloom Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 414-428, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Farinaz Koushanfar, Inki Hong, Miodrag Potkonjak |
Behavioral synthesis techniques for intellectual property protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 10(3), pp. 523-545, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
watermarking, behavioral synthesis, Intellectual property protection |
22 | John Power, Miki Tanaka |
Binding Signatures for Generic Contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TLCA ![In: Typed Lambda Calculi and Applications, 7th International Conference, TLCA 2005, Nara, Japan, April 21-23, 2005, Proceedings, pp. 308-323, 2005, Springer, 3-540-25593-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Thomas Pornin, Julien P. Stern |
Digital Signatures Do Not Guarantee Exclusive Ownership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 138-150, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Aggelos Kiayias, Moti Yung |
Group Signatures with Efficient Concurrent Join. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 198-214, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Joseph K. Liu, Duncan S. Wong |
Linkable Ring Signatures: Security Models and New Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 614-623, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 275-292, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
22 | Shai Rubin, Somesh Jha, Barton P. Miller |
Language-Based Generation and Evaluation of NIDS Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 3-17, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Heiko Rossnagel, Denis Royer |
Making Money with Mobile Qualified Electronic Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 110-118, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk |
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 86-100, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham |
Sequential Aggregate Signatures from Trapdoor Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 74-90, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | HyoJin Yoon, Jung Hee Cheon, Yongdae Kim |
Batch Verifications with ID-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 233-248, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ID-based signatures, Batch verifications |
22 | Charles L. Karr, Rodney Bowersox, Vishnu Singh |
Minimization of Sonic Boom on Supersonic Aircraft Using an Evolutionary Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation - GECCO 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part II, pp. 2157-2167, 2003, Springer, 3-540-40603-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 96-110, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Mohsen Ashourian, Yo-Sung Ho |
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 179-190, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 418-433, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk |
Authentication of Concast Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 185-198, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Gene Itkis |
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 102-118, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Greg Maitland, Colin Boyd |
Co-operatively Formed Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 218-235, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang |
Abstraction-based intrusion detection in distributed environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(4), pp. 407-452, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
intrusion detection, heterogeneous systems, Cooperative information systems, misuse detection |
22 | David Naccache, David Pointcheval, Jacques Stern |
Twin signatures: an alternative to the hash-and-sign paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 20-27, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
flexible RSA problem, digital signatures, provable security, generic model, discrete logarithm, standard model |
22 | Ron Steinfeld, Laurence Bull, Yuliang Zheng 0001 |
Content Extraction Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 285-304, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fragment-extraction, content blinding, fact verification, content verification, digital signatures, provable security, Content-extraction |
22 | Adam L. Young, Moti Yung |
Bandwidth-Optimal Kleptographic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 235-250, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory |
22 | Kazuo Ohta, Tatsuaki Okamoto |
On Concrete Security Treatment of Signatures Derived from Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 354-369, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | Mohammed Fadle Abdulla, C. P. Ravikumar, Anshul Kumar |
A Novel BIST Architecture With Built-in Self Check. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 9th International Conference on VLSI Design (VLSI Design 1996), 3-6 January 1996, Bangalore, India, pp. 57-60, 1996, IEEE Computer Society, 0-8186-7228-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
22 | Guevara Noubir, K. Vijayananda, Henri J. Nussbaumer |
A robust transport protocol for run-time fault detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 1995 International Conference on Network Protocols, ICNP 1995, November 7-10, 1995, Tokyo, Japan, pp. 164-171, 1995, IEEE Computer Society, 0-8186-7216-1. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
22 | David Chaum, Sandra Roijakkers |
Unconditionally Secure Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 206-214, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
22 | Tatsuaki Okamoto, Kazuo Ohta |
How to Utilize the Randomness of Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 456-475, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
22 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 101-120, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
22 | Antonia Azzini, Stefania Marrara, Meiko Jensen, Jörg Schwenk |
Extending the similarity-based XML multicast approach with digital signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 6th ACM Workshop On Secure Web Services, SWS 2009, Chicago, Illinois, USA, November 13, 2009, pp. 45-52, 2009, ACM, 978-1-60558-789-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
similarity-based aggregation, smp protocol, xml signature, xml similarity |
22 | Lei Zhang 0009, Qianhong Wu, Bo Qin |
Identity-Based Verifiably Encrypted Signatures without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 76-89, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature |
22 | Ee-Chien Chang, Chee Liang Lim, Jia Xu 0006 |
Short Redactable Signatures Using Random Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 133-147, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Redactable Signature Scheme, Random Tree, Privacy |
22 | Go Ohtake, Arisa Fujii, Goichiro Hanaoka, Kazuto Ogawa |
On the Theoretical Gap between Group Signatures with and without Unlinkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 149-166, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, group signature, unlinkability |
22 | Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern |
Cryptanalysis of ISO/IEC 9796-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(1), pp. 27-51, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ISO/IEC 9796-1 signature standard, Rabin signatures, Cryptanalysis, Encoding scheme, RSA signatures |
22 | Peter Landrock |
New PKI Protocols Using Tamper Resistant Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 1-16, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Practical PKI, Light weight digital signature, HSM |
22 | Yutao Zhong 0001, Wentao Chang |
Sampling-based program locality approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMM ![In: Proceedings of the 7th International Symposium on Memory Management, ISMM 2008, Tucson, AZ, USA, June 7-8, 2008, pp. 91-100, 2008, ACM, 978-1-60558-134-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
reuse signature, sampling, profiling, reuse distance, program locality |
22 | Sebastian Rohde, Thomas Eisenbarth 0001, Erik Dahmen, Johannes Buchmann 0001, Christof Paar |
Fast Hash-Based Signatures on Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 104-117, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash based cryptography, Merkle signature scheme, digital signatures, Embedded security |
22 | Hahnsang Kim, Joshua Smith, Kang G. Shin |
Detecting energy-greedy anomalies and mobile malware variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), Breckenridge, CO, USA, June 17-20, 2008, pp. 239-252, 2008, ACM, 978-1-60558-139-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
power consumption history, power signature |
22 | Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam |
Improved Bounds on Security Reductions for Discrete Log Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 93-107, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Schnorr Signature Scheme, Provable Security, Random Oracle Model |
22 | Zuhua Shao |
Self-certified Signatures Based on Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIFI ![In: Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, pp. 252-263, 2007, Springer, 978-3-540-73073-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public key signature, Discrete logarithm, strong unforgeability |
22 | Qiong Ren, Yi Mu 0001, Willy Susilo |
SEFAP: An Email System for Anti-Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 782-787, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Malicious Email, Digital Signature, Anti-Phishing |
22 | Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto |
Verifier-Key-Flexible Universal Designated-Verifier Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 403-421, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
universal designated-verifier signature, verifier-key-flexible, random oracle, ECDSA |
22 | Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin |
Lightweight, pollution-attack resistant multicast authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 148-156, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
signature amortization, authentication, multicast, erasure code, pollution-attack |
22 | Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai |
Digitally signed document sanitizing scheme based on bilinear maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 343-354, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital signature, information disclosure, privacy issue |
22 | Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 67-72, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XML signature standard, verifiable random function, security, privacy, WS-security, federated identity management |
22 | Chul Sur, Jong-Phil Yang, Kyung Hyune Rhee |
A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 952-962, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Efficient Authentication, Simplified Certificate Status Management, Personal Area Network, One-Time Signature |
22 | Shidi Xu, Yi Mu 0001, Willy Susilo |
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 99-110, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Online/offline, Routing, MANET, signature, Multisignature |
22 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 17-24, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
22 | Olivier Billet, Henri Gilbert |
Cryptanalysis of Rainbow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 336-347, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow |
22 | Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen |
Escrowed Linkability of Ring Signatures and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 175-192, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
pairings, ring signature, identity-based, linkability |
22 | Jingmei Liu, Xiangguo Cheng, Xinmei Wang |
Methods to Forge ElGamal Signatures and Determine Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 859-862, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Signature, ElGamal |
22 | Zehui Wang, Zhiguo Zhang |
XTR + : A Provable Security Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 534-544, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Public key system, Trace function, IND-CCA2, Provable security, Blind signature, XTR |
22 | James A. Muir |
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 420-434, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
signature verification, fault analysis, RSA signatures, hardware faults |
22 | Chin-Chen Chang 0001, Iuon-Chang Lin |
An improvement of delegated multisignature scheme with document decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 52-57, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, multisignature |
22 | Pierre-Alain Fouque, Guillaume Poupard |
On the Security of RDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 462-476, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
DSA variant, known-message attack, cryptanalysis, GPS, Signature scheme, lattice reduction |
22 | Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen |
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers, pp. 151-164, 2001, Springer, 3-540-43066-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
binary anomalous curve, accelerated signature schemes, Elliptic curve, scalar multiplication, pseudo-random generators |
22 | Phong Q. Nguyen, Igor E. Shparlinski |
On the Insecurity of a Server-Aided RSA Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 21-35, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Server-aided protocol, Cryptanalysis, Lattices, RSA signature |
22 | Chih-Hsuan Tzeng, Wen-Hsiang Tsai |
A new technique for authentication of image/video for multimedia applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, October 5, 2001, pp. 23-26, 2001, ACM, 1-58113-393-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
JPEG/MPEG compression, compression tolerance, image/video authentication, digital signature |
22 | Marc Joye, Jean-Jacques Quisquater |
On Rabin-Type Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 99-113, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Rabin-type systems, signature forgeries, digital signatures, factorization |
22 | Chuan-Kun Wu, Vijay Varadharajan |
Fair Exchange of Digital Signatures with Offline Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 466-470, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Electronic commerce, Digital signature, Fair exchange |
22 | Paul Chang, Brion L. Keller, Sarala Paliwal |
Effective parallel processing techniques for the generation of test data for a logic built-in self test system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 9th Asian Test Symposium (ATS 2000), 4-6 December 2000, Taipei, Taiwan, pp. 374-379, 2000, IEEE Computer Society, 0-7695-0887-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
logic built-in self test, complex processor, simulation time, random stimulus generation, signature computation, Pseudo-Random Pattern Generators, serial compression, response data, serial pattern dependency, parallel processing, parallel processing, logic testing, partitioning, built-in self test, integrated circuit testing, automatic test pattern generation, signatures, parallel simulation, microprocessor chips, logic simulation, logic simulation, post processing, logic partitioning, test data |
22 | Margus Freudenthal, Sven Heiberg, Jan Willemson |
Personal Security Environment on Palm PDA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 366-372, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
personal security environment, Palm PDA, secret signing key, mobile computing device, smart-card reader, mobile security applications, device selection, private key handling, mobile computing, personal digital assistant, smart cards, personal computing, message authentication, microcomputer applications, digital signature schemes, design issues, notebook computers |
22 | Piero Olivo, Marcello Dalpasso |
A Bist Scheme for Non-Volatile Memories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 12(1-2), pp. 139-144, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
off-line testing, built-in self-test, signature analysis, non-volatile memories |
22 | Anne E. Gattiker, Wojciech Maly |
Current signatures [VLSI circuit testing]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 14th IEEE VLSI Test Symposium (VTS'96), April 28 - May 1, 1996, Princeton, NJ, USA, pp. 112-117, 1996, IEEE Computer Society, 0-8186-7304-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
VLSI circuit testing, current signature, passive defects, active defects, VLSI, integrated circuit testing, CMOS integrated circuits, I/sub DDQ/ testing |
22 | O. Kebichi, Vyacheslav N. Yarmolik, Michael Nicolaidis |
Zero aliasing ROM BIST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electron. Test. ![In: J. Electron. Test. 5(4), pp. 377-388, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
error cancellation, error masking, ROM BIST, Aliasing, signature analysis |
22 | Jan-Hendrik Evertse, Eugène van Heyst |
Which New RSA Signatures Can Be Computed From Some Given RSA Signatures? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 83-97, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
RSA scheme, cryptographic protocol, RSA signature |
22 | Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi |
Secure Audio Teleconference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, pp. 418-426, 1987, Springer, 3-540-18796-0. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
identification, signature, bridging, secrecy |
22 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
A Practical Provider Authentication System for Bidirectional Broadcast Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 967-974, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
provider authentication, bidirectional broadcasting, key-insulated signature, digital signature |
22 | Leonardo Guerreiro Azevedo, Ralf Hartmut Güting, Rafael Brand Rodrigues, Geraldo Zimbrão, Jano Moreira de Souza |
Filtering with raster signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 14th ACM International Symposium on Geographic Information Systems, ACM-GIS 2006, November 10-11, 2006, Arlington, Virginia, USA, Proceedings, pp. 187-194, 2006, ACM, 1-59593-529-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
four-colors raster signature, multi-step query processor, raster approximation, three-colors raster signature, GIS, spatial databases, spatial join |
22 | Bob Blakley 0001, G. R. Blakley |
All sail, no anchor II: Acceptable high-end PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(2), pp. 66-77, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Digital signature, Signature, PKI, Law, RSA cryptosystem, Nonrepudiation |
22 | Niklas Borselius, Chris J. Mitchell, Aaron Wilson |
On the value of threshold signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 36(4), pp. 30-35, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, mobile agent, digital signature, threshold signature |
21 | Dimitrios Poulakis |
A variant of Digital Signature Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 51(1), pp. 99-104, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
21 | Alireza Ahrary, Hui-ju Chiang, Sei-ichiro Kamata |
On-Line Signature Matching Based on Hilbert Scanning Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 1190-1199, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hilbert scanning patterns, Hilbert scanning distance, Gaussian mixture model |
21 | Juan Manuel Pascual-Gaspar, Valentín Cardeñoso-Payo, Carlos Vivaracho-Pascual |
Practical On-Line Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 1180-1189, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ying Sun, Chunxiang Xu, Qi Xia, Yong Yu 0002 |
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 661-664, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Wei Yan, Erik Wu |
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (1) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 1, pp. 724-728, 2009, Springer, 978-3-642-02465-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network security, cloud computing, malware, anti-virus |
|
|