Sciweavers

401 search results - page 25 / 81
» Delegatable Functional Signatures
Sort
View
CORR
2011
Springer
184views Education» more  CORR 2011»
13 years 2 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom
WACV
2012
IEEE
12 years 3 months ago
Predicting human gaze using quaternion DCT image signature saliency and face detection
We combine and extend the previous work on DCT-based image signatures and face detection to determine the visual saliency. To this end, we transfer the scalar definition of image...
Boris Schauerte, Rainer Stiefelhagen
IEEEARES
2007
IEEE
14 years 1 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
CCS
1999
ACM
13 years 11 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Distance-Level Fusion Strategies for Online Signature Verification
In this paper an approach for combining online signature authentication experts will be proposed. The different experts are based on one feature extraction method presented in our...
Tobias Scheidat, Claus Vielhauer, Jana Dittmann