Sciweavers

6574 search results - page 4 / 1315
» Current Signatures: Application
Sort
View
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 2 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
ASIACRYPT
2005
Springer
14 years 1 months ago
Universally Convertible Directed Signatures
Many variants of Chaum and van Antwerpen’s undeniable signatures have been proposed to achieve specific properties desired in real-world applications of cryptography. Among them...
Fabien Laguillaumie, Pascal Paillier, Damien Vergn...
EUROMICRO
1996
IEEE
13 years 12 months ago
Software Monitoring and Debugging Using Compressed Signature Sequences
Signature based error detection techniques (e.g. the application of watchdog processors) can be easily extended to support software debugging. The run-time sequence of signatures ...
István Majzik
ICDAR
2007
IEEE
14 years 2 months ago
On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction
In the present contribution, the applicability of off-line handwritten signatures to the fuzzy vault construction is studied. Feature extraction is based on quantized maxima and m...
Manuel R. Freire, Julian Fiérrez-Aguilar, M...
PROVSEC
2009
Springer
14 years 2 months ago
Anonymous Signatures Revisited
Abstract. We revisit the notion of the anonymous signature, first formalized by Yang, Wong, Deng and Wang [12], and then further developed by Fischlin [6] and Zhang and Imai [13]. ...
Vishal Saraswat, Aaram Yun