Sciweavers

1094 search results - page 9 / 219
» List signature schemes
Sort
View
CCS
2010
ACM
15 years 6 months ago
Attribute-based signature and its applications
In an attribute-based signature (ABS), users sign messages with any predicate of their attributes issued from an attribute authority. Under this notion, a signature attests not to...
Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui...
ICDAR
2009
IEEE
14 years 9 months ago
Geometric Centroids and their Relative Distances for Off-line Signature Verification
In this paper, we propose a new approach for symbolic representation of off-line signatures based on relative distances between centroids useful for verification. Distances betwee...
H. N. Prakash, D. S. Guru
BMCBI
2005
153views more  BMCBI 2005»
14 years 11 months ago
Mining published lists of cancer related microarray experiments: Identification of a gene expression signature having a critical
Background: Routine application of gene expression microarray technology is rapidly producing large amounts of data that necessitate new approaches of analysis. The analysis of a ...
Giacomo Finocchiaro, Francesco Mancuso, Heiko M&uu...
CSREASAM
2009
15 years 1 months ago
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
Jerome Dossogne, Olivier Markowitch
COMPSEC
2004
99views more  COMPSEC 2004»
14 years 11 months ago
An improvement of nonrepudiable threshold proxy signature scheme with known signers
In a (t, n) threshold proxy signature scheme, which is a variant of the proxy signature scheme, the proxy signature key is shared among a group of n proxy signers delegated by the ...
Shiang-Feng Tzeng, Min-Shiang Hwang, Cheng-Ying Ya...