Sciweavers

135 search results - page 9 / 27
» Attribute-based signature and its applications
Sort
View
ISW
2005
Springer
14 years 3 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
13 years 7 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
ACSAC
2008
IEEE
14 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
CSIE
2009
IEEE
14 years 4 months ago
Supervised Control of a Flying Performing Robot Using Its Intrinsic Sound
We present the current results of our ongoing research in achieving efficient control of a flying robot for a wide variety of possible applications. A lightweight small indoor h...
Benjamin N. Passow, Sophy Smith, Mario A. Gó...
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 1 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval