Sciweavers

468 search results - page 19 / 94
» A Certified Digital Signature
Sort
View
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 3 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
FTDCS
2003
IEEE
14 years 3 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
CSFW
2005
IEEE
14 years 3 months ago
Deciding Knowledge in Security Protocols under (Many More) Equational Theories
In the analysis of security protocols, the knowledge of attackers is often described in terms of message deducibility and indistinguishability relations. In this paper, we pursue ...
Martín Abadi, Véronique Cortier
FC
2000
Springer
150views Cryptology» more  FC 2000»
14 years 1 months ago
Self-Scrambling Anonymizers
For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency...
David Pointcheval
CCS
2010
ACM
13 years 10 months ago
Synchronized aggregate signatures: new definitions, constructions and applications
An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signa...
Jae Hyun Ahn, Matthew Green, Susan Hohenberger