Sciweavers

401 search results - page 13 / 81
» Delegatable Functional Signatures
Sort
View
SP
2005
IEEE
100views Security Privacy» more  SP 2005»
14 years 1 months ago
Polygraph: Automatically Generating Signatures for Polymorphic Worms
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
James Newsome, Brad Karp, Dawn Xiaodong Song
FC
2004
Springer
120views Cryptology» more  FC 2004»
14 years 26 days ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
CRYPTO
2000
Springer
139views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
On the Exact Security of Full Domain Hash
Abstract. The Full Domain Hash (FDH) scheme is a RSA-based signature scheme in which the message is hashed onto the full domain of the RSA function. The FDH scheme is provably secu...
Jean-Sébastien Coron
CSC
2006
13 years 9 months ago
B-Splines for Genomic Signatures
- A variety of data analysis concerned with genome sequences support the proposal that each living organism owns a genomic signature. Classical approaches to the genomic signature ...
Gennaro Iaccarino, Filomena de Santis
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...