Sciweavers

569 search results - page 16 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
ISW
1999
Springer
14 years 22 days ago
Cryptanalysis of Two Group Signature Schemes
Abstract. Group signature schemes allow a group member to anonymously sign on group’s behalf. Moreover, in case of anonymity misuse, a group authority can recover the issuer of a...
Marc Joye, Seungjoo Kim, Narn-Yih Lee
ICISC
2001
162views Cryptology» more  ICISC 2001»
13 years 9 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
ACISP
2001
Springer
14 years 29 days ago
Elliptic Curve Cryptography on a Palm OS Device
The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing ...
André Weimerskirch, Christof Paar, Sheuelin...
ESORICS
2009
Springer
13 years 11 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
IEEEARES
2006
IEEE
14 years 2 months ago
Digital Signatures with Familiar Appearance for e-Government Documents: Authentic PDF
Abstract— Most e-government applications have to find a solution for simple, reliable, secure and authentic signing of official documents. Citizens need a simple way to verify ...
Thomas Neubauer, Edgar Weippl, Stefan Biffl