Sciweavers

590 search results - page 39 / 118
» Short Group Signatures
Sort
View
NDSS
2008
IEEE
15 years 6 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
ICASSP
2008
IEEE
15 years 6 months ago
Performance and robustness: A trade-off in dynamic signature verification
A performance and robustness study for on-line signature veri cation is presented. Experiments are carried out on the MCYT database comprising 16,500 signatures from 330 subjects,...
Javier Galbally, Julian Fiérrez, Javier Ort...
ASIACRYPT
2001
Springer
15 years 4 months ago
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in design...
Anna Lysyanskaya, Chris Peikert
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
14 years 9 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
ICNS
2009
IEEE
15 years 6 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...