Sciweavers

242 search results - page 12 / 49
» Practical Digital Signature Generation Using Biometrics
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 2 months ago
Using Knowledge Management Systems to Structure Knowledgeable Practices
The purpose of this study is to explore the role of knowledge management systems (KMS) in structuring knowledgeable practices within organizations. Specifically, we consider how i...
Chad Saunders, Mike Chiasson
ASPDAC
2010
ACM
163views Hardware» more  ASPDAC 2010»
13 years 5 months ago
A PUF design for secure FPGA-based embedded systems
The concept of having an integrated circuit (IC) generate its own unique digital signature has broad application in areas such as embedded systems security, and IP/IC counterpiracy...
Jason Helge Anderson
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
14 years 1 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan
CISC
2007
Springer
155views Cryptology» more  CISC 2007»
13 years 11 months ago
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Abstract. In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not h...
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
HICSS
2009
IEEE
113views Biometrics» more  HICSS 2009»
14 years 2 months ago
Digital Forensics: Defining a Research Agenda
While many fields have well-defined research agendas, evolution of the field of digital forensics has been largely driven by practitioners in the field. As a result, the majority ...
Kara L. Nance, Brian Hay, Matt Bishop