Sciweavers

6574 search results - page 16 / 1315
» Current Signatures: Application
Sort
View
TEC
2002
166views more  TEC 2002»
13 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
ICASSP
2009
IEEE
14 years 4 months ago
Geometric distortion signatures for printer identification
We present a forensic technique for analyzing a printed image in order to trace the originating printer. Our method, which is applicable for commonly used electrophotographic (EP)...
Orhan Bulan, Junwen Mao, Gaurav Sharma
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 3 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
EUROCRYPT
2001
Springer
14 years 2 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 4 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß