Sciweavers

590 search results - page 44 / 118
» Short Group Signatures
Sort
View
SP
2002
IEEE
140views Security Privacy» more  SP 2002»
14 years 11 months ago
Efficient Multicast Packet Authentication Using Signature Amortization
We describe a novel method for authenticating multicast packets that is robust against packet loss. Our main focus is to minimize the size of the communication overhead required t...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
14 years 10 months ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang
ICS
2010
Tsinghua U.
15 years 9 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
MOBICOM
2010
ACM
15 years 1 days ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...
IJCNN
2007
IEEE
15 years 6 months ago
A Hybrid HMM/ANN Based Approach for Online Signature Verification
: This paper presents a new approach based on HMM/ANN hybrid for online signature verification. A group of ANNs are used as local probability estimators for an HMM. The Viterbi alg...
Zhong-Hua Quan, De-Shuang Huang, Kun-hong Liu, Kwo...