Sciweavers

AVBPA
2005
Springer
256views Biometrics» more  AVBPA 2005»
13 years 10 months ago
Modification of Intersession Variability in On-Line Signature Verifier
For Pen-input on-line signature verification algorithms, the influence of intersession variability is a considerable problem because hand-written signatures change with time, causi...
Yasunori Hongo, Daigo Muramatsu, Takashi Matsumoto
ASIACRYPT
2005
Springer
13 years 10 months ago
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
Abstract We provide evidence that the unforgeability of several discrete-log based signatures like Schnorr signatures cannot be equivalent to the discrete log problem in the standa...
Pascal Paillier, Damien Vergnaud
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
13 years 10 months ago
Digital Signatures Do Not Guarantee Exclusive Ownership
Digital signature systems provide a way to transfer trust from the public key to the signed data; this is used extensively within PKIs. However, some applications need a transfer o...
Thomas Pornin, Julien P. Stern
MINENET
2005
ACM
13 years 10 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
SP
2005
IEEE
13 years 10 months ago
Language-Based Generation and Evaluation of NIDS Signatures
We present a methodology to automatically construct robust signatures whose accuracy is based on formal reasoning so it can be systematically evaluated. Our methodology is based o...
Shai Rubin, Somesh Jha, Barton P. Miller
ICMCS
2005
IEEE
178views Multimedia» more  ICMCS 2005»
13 years 10 months ago
Audio, video and audio-visual signatures for short video clip detection: experiments on Trecvid2003
In this paper, we present the association of audio and video signatures for short video clip detection. First, we present an audio signature based on the spectral flatness measure...
Benjamin Senechal, Denis Pellerin, Laurent Besacie...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
13 years 10 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
SMI
2006
IEEE
138views Image Analysis» more  SMI 2006»
13 years 10 months ago
Curves-on-Surface: A General Shape Comparison Framework
We develop a new surface matching framework to handle surface comparisons based on a novel mathematical analysis of curves on surfaces, and propose a unique signature for any clos...
Xin Li, Ying He 0001, Xianfeng Gu, Hong Qin
RAID
2007
Springer
13 years 10 months ago
Advanced Allergy Attacks: Does a Corpus Really Help?
Abstract. As research in automatic signature generators (ASGs) receives more attention, various attacks against these systems are being identified. One of these attacks is the “...
Simon P. Chung, Aloysius K. Mok
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
13 years 10 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang