Sciweavers

790 search results - page 40 / 158
» Hierarchical Group Signatures
Sort
View
EUROCRYPT
2009
Springer
16 years 1 months ago
Asymmetric Group Key Agreement
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish...
Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, Josep Do...
103
Voted
PKC
2010
Springer
183views Cryptology» more  PKC 2010»
15 years 4 months ago
Unlinkability of Sanitizable Signatures
Sanitizable signatures allow a designated party, called the sanitizer, to modify parts of signed data such that the immutable parts can still be verified with respect to the origi...
Christina Brzuska, Marc Fischlin, Anja Lehmann, Do...
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
15 years 10 days ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
108
Voted
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
14 years 11 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
101
Voted
IJCNN
2007
IEEE
15 years 7 months ago
A Hybrid HMM/ANN Based Approach for Online Signature Verification
: This paper presents a new approach based on HMM/ANN hybrid for online signature verification. A group of ANNs are used as local probability estimators for an HMM. The Viterbi alg...
Zhong-Hua Quan, De-Shuang Huang, Kun-hong Liu, Kwo...