Sciweavers

763 search results - page 40 / 153
» Digital Signatures Today
Sort
View
HICSS
2002
IEEE
115views Biometrics» more  HICSS 2002»
14 years 16 days ago
Hermes--A Lean M-commerce Software Platform Utilizing Electronic Signatures
The world-wide growth of the mobile-telephony market opens the door for mobile commerce (m-commerce). For the restricted target platforms used for m-commerce such as mobile phones...
Sebastian Fischmeister, Günther Hagleitner, W...
ICPR
2004
IEEE
14 years 8 months ago
Using Adapted Levenshtein Distance for On-Line Signature Authentication
In this paper a new method for on-line signature authentication will be presented, which is based on a event-string modelling of features derived from pen-position and pressure si...
Sascha Schimke, Claus Vielhauer, Jana Dittmann
ICWS
2009
IEEE
14 years 4 months ago
Analysis of Signature Wrapping Attacks and Countermeasures
In recent research it turned out that Boolean verification of digital signatures in the context of WSSecurity is likely to fail: If parts of a SOAP message are signed and the sig...
Sebastian Gajek, Meiko Jensen, Lijun Liao, Jö...
CRYPTO
1998
Springer
106views Cryptology» more  CRYPTO 1998»
13 years 11 months ago
New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications
Verifiable Signature Sharing (VS ) enables the recipient of a digital signature, who is not necessarily the original signer, to share such signature among n proxies so that a subse...
Dario Catalano, Rosario Gennaro
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
13 years 11 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng