Sciweavers

55 search results - page 8 / 11
» Traceable Ring Signature
Sort
View
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
14 years 9 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
FPL
2009
Springer
105views Hardware» more  FPL 2009»
15 years 2 months ago
Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators
A silicon Physical Unclonable Function (PUF), which is a die-unique challenge-response function, is an emerging hardware primitive for secure applications. It exploits manufacturi...
Abhranil Maiti, Patrick Schaumont
ICPR
2004
IEEE
15 years 10 months ago
Deformable Geometry Model Matching by Topological and Geometric Signatures
In this paper, we present a novel method for efficient 3D model comparison. The method matches highly deformed models by comparing topological and geometric features. First, we pr...
Kwok-Leung Tam, Rynson W. H. Lau, Chong-Wah Ngo
CCR
2000
101views more  CCR 2000»
14 years 9 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
91
Voted
ESORICS
2009
Springer
15 years 22 days ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...