Sciweavers

787 search results - page 97 / 158
» Subversion-Resilient Signature Schemes
Sort
View
COMCOM
1999
73views more  COMCOM 1999»
14 years 9 months ago
Securing digital signatures for non-repudiation
Dispute of transactions is a common problem that could jeopardise business. Hence non-repudiation services are essential in business transactions which provide evidence to enable ...
Jianying Zhou, Kwok-Yan Lam
IAW
2003
IEEE
15 years 3 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ITNG
2007
IEEE
15 years 4 months ago
An Improved Signcryption Scheme and Its Variation
Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and authenticity. This paper proposes an improved signcryption scheme and a varia...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
ICIP
2002
IEEE
15 years 11 months ago
Region-based retrieval: coarse segmentation with fine color signature
The two major problems raised by a region-based image retrieval system are the automatic definition and description of regions. In this paper we first present a technique of unsup...
Julien Fauqueur, Nozha Boujemaa
ICDAR
2009
IEEE
15 years 4 months ago
Toward Resisting Forgery Attacks via Pseudo-Signatures
Recent work has shown that certain handwriting biometrics are susceptible to forgery attacks, both human- and machine-based. In this paper, we examine a new scheme for using handw...
Jin Chen, Daniel P. Lopresti, Fabian Monrose