Sciweavers

152 search results - page 2 / 31
» On Signatures of Knowledge
Sort
View
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 5 months ago
A Directed Signature Scheme Based on RSA Assumption
A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signe...
Rongxing Lu, Zhenfu Cao
IJNSEC
2010
127views more  IJNSEC 2010»
13 years 14 days ago
Identity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an...
Hu Xiong, Zhiguang Qin, Fagen Li
ETRICS
2006
13 years 9 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ICFHR
2010
207views Biometrics» more  ICFHR 2010»
13 years 15 days ago
Forensic Signature Verification Competition 4NSigComp2010 - Detection of Simulated and Disguised Signatures
This competition scenario aims at a performance comparison of several automated systems for the task of signature verification. The systems have to rate the probability of authors...
Marcus Liwicki, C. Elisa van den Heuvel, Bryan Fou...
ISCI
2008
86views more  ISCI 2008»
13 years 5 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...