Sciweavers

1094 search results - page 36 / 219
» List signature schemes
Sort
View
ICDAR
2007
IEEE
14 years 4 months ago
On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction
In the present contribution, the applicability of off-line handwritten signatures to the fuzzy vault construction is studied. Feature extraction is based on quantized maxima and m...
Manuel R. Freire, Julian Fiérrez-Aguilar, M...
PR
1998
97views more  PR 1998»
13 years 9 months ago
On-line signature verification based on logarithmic spectrum
—In this paper, an on-line signature verification scheme based on similarity measurement of logarithmic spectrum is proposed. The principal components of the logarithmic spectru...
Quen-Zong Wu, Suh-Yin Lee, I-Chang Jou
ICCSA
2005
Springer
14 years 3 months ago
Security Flaws in Several Group Signatures Proposed by Popescu
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...
Guilin Wang, Sihan Qing
IADIS
2004
13 years 11 months ago
Voting with Designated Verifier Signature-Like Protocol
We propose in this paper a new voting scheme where the voter, while receiving a receipt for his/her vote allowing further contestations, cannot use it to reveal the vote to other u...
Emmanuel Dall'Olio, Olivier Markowitch
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 10 months ago
Security Analysis of Some Batch Verifying Signatures from Pairings
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from...
Tianjie Cao, Dongdai Lin, Rui Xue