Sciweavers

DIAL
2006
IEEE
117views Image Analysis» more  DIAL 2006»
13 years 11 months ago
Document Image Retrieval using Signatures as Queries
In searching a repository of business documents, a task of interest is that of using a query signature image to retrieve from a database, other signatures matching the query. The ...
Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Ha...
DEXAW
2006
IEEE
140views Database» more  DEXAW 2006»
13 years 11 months ago
String-Matching and Update through Algebraic Signatures in Scalable Distributed Data Structures
: Scalable Distributed Data Structures (SDDSs) store large scalable files over a distributed RAM of nodes in a grid or a P2P network. The files scale transparently for the applicat...
Riad Mokadem, Witold Litwin
WAIFI
2007
Springer
110views Mathematics» more  WAIFI 2007»
13 years 11 months ago
On Kabatianskii-Krouk-Smeets Signatures
Kabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme based on random error-correcting codes. In this paper we investigate the security and the efficiency of ...
Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud
FC
2007
Springer
158views Cryptology» more  FC 2007»
13 years 11 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
EUROCRYPT
2007
Springer
13 years 11 months ago
Mesh Signatures
sion of an extended abstract to be published in Advances in Cryptology—EUROCRYPT 2007, Springer-Verlag, 2007. Available online from the IACR Cryptology ePrint Archive as Report 2...
Xavier Boyen
SP
2007
IEEE
13 years 11 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
CSFW
2007
IEEE
13 years 11 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ICMCS
2008
IEEE
135views Multimedia» more  ICMCS 2008»
13 years 11 months ago
Audio and video signatures for synchronization
Abstract— We propose a framework based on signatures extracted from audio and video streams for automatically measuring and maintaining synchronization between the two streams. T...
Regunathan Radhakrishnan, Kent Terry, Claus Bauer
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
ICDAR
2009
IEEE
13 years 11 months ago
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Katrin Franke