Sciweavers

985 search results - page 44 / 197
» On the validity of digital signatures
Sort
View
IEEEMSP
2002
IEEE
156views Multimedia» more  IEEEMSP 2002»
14 years 1 months ago
A robust and secure media signature scheme for JPEG images
—In [1, 2, 3], we have introduced a robust and secure digital signature solution for multimedia content authentication, by integrating content feature extraction, error correctio...
Qibin Sun, Qi Tian, Shih-Fu Chang
ACISP
2004
Springer
14 years 2 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim
ISCAS
2007
IEEE
129views Hardware» more  ISCAS 2007»
14 years 3 months ago
ECC Processor with Low Die Size for RFID Applications
Abstract— This paper presents the design of a special purpose processor with Elliptic Curve Digital Signature Algorithm (ECDSA) functionality. This digital signature generation d...
Franz Fürbass, Johannes Wolkerstorfer
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 2 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
FC
2005
Springer
87views Cryptology» more  FC 2005»
14 years 2 months ago
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce
We surveyed 470 Amazon.com merchants regarding their experience, knowledge and perceptions of digitally-signed email. Some of these merchants (93) had been receiving digitally-sign...
Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nor...