Sciweavers

790 search results - page 11 / 158
» Designated Confirmer Signatures
Sort
View
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
14 years 2 months ago
Hardware-Assisted Scanning for Signature Patterns in Image File Fragments
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is an important activity in the field of digital f...
Yoginder S. Dandass
ICICS
2003
Springer
14 years 26 days ago
Security Remarks on a Group Signature Scheme with Member Deletion
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable fashion. In case of a dispute, however, a des...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
JCST
2007
98views more  JCST 2007»
13 years 7 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
14 years 1 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré