Sciweavers

4820 search results - page 16 / 964
» Implementing Signatures for C
Sort
View
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
13 years 11 months ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
NSDI
2010
13 years 9 months ago
SplitScreen: Enabling Efficient, Distributed Malware Detection
We present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase...
Sang Kil Cha, Iulian Moraru, Jiyong Jang, John Tru...
ICC
2007
IEEE
169views Communications» more  ICC 2007»
14 years 1 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
ACNS
2009
Springer
121views Cryptology» more  ACNS 2009»
13 years 11 months ago
Efficient Deniable Authentication for Signatures
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicio...
Jean Monnerat, Sylvain Pasini, Serge Vaudenay
VIROLOGY
2010
128views more  VIROLOGY 2010»
13 years 5 months ago
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
This research proposes a novel automatic method (termed Auto-Sign) for extracting unique signatures of malware executables to be used by high-speed malware filtering devices based...
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Roka...