Sciweavers

15 search results - page 1 / 3
» On the performance, feasibility, and use of forward-secure s...
Sort
View
CCS
2003
ACM
13 years 10 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
ESMART
2001
Springer
13 years 9 months ago
Use of Biometrics for User Verification in Electronic Signature Smartcards
If a smartcard provides security functions such as electronic signature creation, valuables such as electronic money and/or sensitive data such as medical data, then the smartcard ...
Bruno Struif
IEEEMSP
2002
IEEE
129views Multimedia» more  IEEEMSP 2002»
13 years 9 months ago
Embedded signature-based authentication by channel statistics using watermarking techniques
This study examines the feasibility of using channel statistics to perform embedded signature-based authentication. Doing so is an attempt to view a reference watermark embedded w...
Zhi-Fang Yang, Wen-Hsiang Tsai
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
13 years 8 months ago
Continual hashing for efficient fine-grain state inconsistency detection
Transaction-level modeling (TLM) allows a designer to save functional verification effort during the modular refinement of an SoC by reusing the prior implementation of a module a...
Jae W. Lee, Myron King, Krste Asanovic
CONEXT
2007
ACM
13 years 6 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek