Sciweavers

55 search results - page 8 / 11
» Traceable Ring Signature
Sort
View
136
Voted
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
15 years 3 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
124
Voted
FPL
2009
Springer
105views Hardware» more  FPL 2009»
15 years 8 months ago
Improving the quality of a Physical Unclonable Function using configurable Ring Oscillators
A silicon Physical Unclonable Function (PUF), which is a die-unique challenge-response function, is an emerging hardware primitive for secure applications. It exploits manufacturi...
Abhranil Maiti, Patrick Schaumont
133
Voted
ICPR
2004
IEEE
16 years 4 months ago
Deformable Geometry Model Matching by Topological and Geometric Signatures
In this paper, we present a novel method for efficient 3D model comparison. The method matches highly deformed models by comparing topological and geometric features. First, we pr...
Kwok-Leung Tam, Rynson W. H. Lau, Chong-Wah Ngo
121
Voted
CCR
2000
101views more  CCR 2000»
15 years 3 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
141
Voted
ESORICS
2009
Springer
15 years 7 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...