Sciweavers

625 search results - page 12 / 125
» Generalized Ring Signatures
Sort
View
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
ASIACRYPT
2009
Springer
14 years 2 months ago
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
At Eurocrypt 2009 Aggarwal and Maurer proved that breaking RSA is equivalent to factoring in the generic ring model. This model captures algorithms that may exploit the full algeb...
Tibor Jager, Jörg Schwenk
CSL
2004
Springer
14 years 26 days ago
Parameterized Model Checking of Ring-Based Message Passing Systems
The Parameterized Model Checking Problem (PMCP) is to decide whether a temporal property holds for a uniform family of systems,  ¢¡ , comprised of finite, but arbitrarily many,...
E. Allen Emerson, Vineet Kahlon
EUROSEC
2010
ACM
14 years 23 days ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ICIP
2002
IEEE
14 years 9 months ago
An image signature for any kind of image
We describe an algorithm for computing an image signature, suitable for first-stage screening for duplicate images. Our signature relies on relative brightness of image regions, a...
Chi Wong, Marshall W. Bern, David Goldberg