Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
Abstract. A signer in a Nominative Signature (NS) scheme can arbitrarily choose a nominee, then jointly generate a signature in such a way that the signature can only be verified w...
This paper addresses the construction of a novel efficient rotation-invariant texture retrieval method that is based on the alignment in angle of signatures obtained via a steerabl...
George Tzagkarakis, Baltasar Beferull-Lozano, Pana...
Most detection algorithms for hyperspectral imaging applications assume a target with a perfectly known spectral signature. In practice, the target signature is either imperfectly...
Dimitris Manolakis, Ronald Lockwood, Thomas Cooley...
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...