Sciweavers

380 search results - page 13 / 76
» Time Capsule Signature
Sort
View
CJ
2004
93views more  CJ 2004»
13 years 8 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
ACSAC
2006
IEEE
14 years 2 months ago
Enhancing Collaborative Spam Detection with Bloom Filters
Signature-based collaborative spam detection (SCSD) systems provide a promising solution addressing many problems facing statistical spam filters, the most widely adopted technol...
Jeff Yan, Pook Leong Cho
CCS
2001
ACM
14 years 28 days ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
ICMCS
2005
IEEE
80views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Aggregating signatures of MPEG-4 elementary streams
A complete MPEG-4 stream consists of many elementary streams which may be generated by different authors. In the scenario of this paper, each author signs his own authentic elemen...
Yongdong Wu
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 1 months ago
Optimization of the MOVA Undeniable Signature Scheme
This article presents optimization results on the recent MOVA undeniable signature scheme presented by Monnerat and Vaudenay at PKC ’04 as well as its generalization proposed at ...
Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay