Sciweavers

CEAS
2007
Springer
14 years 1 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
ICNP
2007
IEEE
14 years 1 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu
CISIM
2007
IEEE
14 years 1 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
ACSAC
2007
IEEE
14 years 1 months ago
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms
To combat the rapid infection rate of today’s Internet worms, signatures for novel worms must be generated soon after an outbreak. This is especially critical in the case of pol...
Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni...
AFRICACRYPT
2008
Springer
14 years 1 months ago
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for so...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 1 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
SBRN
2008
IEEE
14 years 1 months ago
Combining Distances through an Auto-Encoder Network to Verify Signatures
In this paper we present a system for off-line signature verification. The paper’s contributions are: i) Five distances were calculated and evaluated over the signature databas...
Milena R. P. Souza, Leandro R. Almeida, George D. ...
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
14 years 1 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 1 months ago
Asymptotic Performance of DS-CDMA with Linear MMSE Receiver and Limited Feedback
Abstract—Signature quantization for reverse-link Direct Sequence (DS)- Code Division Multiple Access (CDMA) is considered. A receiver assumed to have perfect estimates of channel...
Wiroonsak Santipach
SPIN
2009
Springer
14 years 1 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...