Sciweavers

754 search results - page 5 / 151
» Generation of Signatures by Deformations
Sort
View
CIS
2005
Springer
14 years 2 months ago
On Anonymity of Group Signatures
A secure group signature is required to be anonymous, that is, given two group signatures generated by two different members on the same message or two group signatures generated ...
Sujing Zhou, Dongdai Lin
TON
2010
119views more  TON 2010»
13 years 7 months ago
Thwarting zero-day polymorphic worms with network-level length-based signature generation
—It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that we can prevent worms from propagating at their early phase...
Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li
IJNSEC
2008
154views more  IJNSEC 2008»
13 years 8 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao
IVC
2006
86views more  IVC 2006»
13 years 8 months ago
Synthesis of image deformation strategies
Warping is one of the key areas of image analysis but there has been no understanding of the effects of different non-linear deformations in literature. This paper addresses the p...
Kanti V. Mardia, José Miguel Angulo, Arnald...
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
14 years 1 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu