Sciweavers

401 search results - page 25 / 81
» Delegatable Functional Signatures
Sort
View
155
Voted
CORR
2011
Springer
184views Education» more  CORR 2011»
14 years 9 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom
253
Voted
WACV
2012
IEEE
13 years 10 months ago
Predicting human gaze using quaternion DCT image signature saliency and face detection
We combine and extend the previous work on DCT-based image signatures and face detection to determine the visual saliency. To this end, we transfer the scalar definition of image...
Boris Schauerte, Rainer Stiefelhagen
IEEEARES
2007
IEEE
15 years 9 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
135
Voted
CCS
1999
ACM
15 years 7 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
107
Voted
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Distance-Level Fusion Strategies for Online Signature Verification
In this paper an approach for combining online signature authentication experts will be proposed. The different experts are based on one feature extraction method presented in our...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann