Sciweavers

985 search results - page 6 / 197
» On the validity of digital signatures
Sort
View
CSREASAM
2007
13 years 10 months ago
Further Discussions on the Security of a Nominative Signature Scheme
A nominative signature scheme allows a nominator (or signer) and a nominee (or verifier) to jointly generate and publish a signature in such a way that only the nominee can verify...
Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu
ETS
2010
IEEE
150views Hardware» more  ETS 2010»
13 years 7 months ago
Predicting dynamic specifications of ADCs with a low-quality digital input signal
— A new method is presented to test dynamic parameters of Analogue-to-Digital Converters (ADC). A noisy and nonlinear pulse is applied as the test stimulus, which is suitable for...
Xiaoqin Sheng, Vincent Kerzerho, Hans G. Kerkhoff
AMC
2005
158views more  AMC 2005»
13 years 8 months ago
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03
At the fourth ACM conference on electronic commerce (EC'03), S. Han, K.Y. Yeung and J. Wang proposed an ID-based confirmer signature scheme using pairings (actually, this is a...
Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
WWW
2005
ACM
14 years 9 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
IJNSEC
2010
100views more  IJNSEC 2010»
13 years 3 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao