Sciweavers

763 search results - page 114 / 153
» Digital Signatures Today
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
CBCD based on color features and landmark MDS-assisted distance estimation
Content-Based Copy Detection (CBCD) of digital videos is an important research field that aims at the identification of modified copies of an original clip, e.g., on the Intern...
Marzia Corvaglia, Fabrizio Guerrini, Riccardo Leon...
JCS
2010
121views more  JCS 2010»
13 years 7 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
MMMACNS
2010
Springer
13 years 7 months ago
Symptoms-Based Detection of Bot Processes
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
IJACT
2010
67views more  IJACT 2010»
13 years 3 months ago
On message recognition protocols: recoverability and explicit confirmation
: We look at message recognition protocols (MRPs) and prove that there is a oneto-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we ...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson