Sciweavers

281 search results - page 26 / 57
» A New RSA-Based Signature Scheme
Sort
View
IGARSS
2009
13 years 8 months ago
Optimum Sampling Scheme for Characterization of Mine Tailings
The paper describes a novice method for sampling geochemicals to characterize mine tailings. We model the spatial relationships between a multi-element signature and, as covariate...
Pravesh Debba, Emmanuel John M. Carranza, Alfred S...
TIFS
2010
130views more  TIFS 2010»
13 years 5 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena
EUROCRYPT
2000
Springer
14 years 2 months ago
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
We exhibit an attack against a signature scheme recently proposed by Gennaro, Halevi and Rabin [9]. The scheme's security is based on two assumptions namely the strong RSA ass...
Jean-Sébastien Coron, David Naccache
ICICS
2004
Springer
14 years 4 months ago
Factorization-Based Fail-Stop Signatures Revisited
Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even i...
Katja Schmidt-Samoa
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
14 years 3 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang