Sciweavers

56 search results - page 7 / 12
» ijnsec 2007
Sort
View
IJNSEC
2007
107views more  IJNSEC 2007»
14 years 9 months ago
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
A proxy signature scheme enables a proxy signer to sign messages on behalf of the original signer. In this paper, we demonstrate that a number of discrete logarithm based proxy si...
Tianjie Cao, Xianping Mao
IJNSEC
2007
138views more  IJNSEC 2007»
14 years 9 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
IJNSEC
2007
118views more  IJNSEC 2007»
14 years 9 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
IJNSEC
2007
189views more  IJNSEC 2007»
14 years 9 months ago
When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA
This paper presents novel studies on fusion strategies for personal identification using fingerprint and iris biometrics. The purpose of our paper is to investigate whether the ...
Alessandra Lumini, Loris Nanni
IJNSEC
2007
142views more  IJNSEC 2007»
14 years 9 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...