نتایج جستجو برای: signature

تعداد نتایج: 65887  

Journal: :I. J. Network Security 2011
Nikolay A. Moldovyan

Using Russian digital signature (DS) standards as the underlying scheme there are designed the blind DS protocols that are the first known implementation of the blind DS based on signature standards. There are also proposed blind collective DS protocols based on the DS standards. The last protocols are also the first implementation of the blind multi-signature schemes using the signature verifi...

2005
Yangjun Chen Yong Shi

DTD Graph from an XML Document: A Reverse Engineering Approach Joseph Fong and Herbert Shiu (2010). Principle Advancements in Database Management Technologies: New Applications and Frameworks (pp. 204-224). www.igi-global.com/chapter/abstract-dtd-graph-xml-document/39357?camid=4v1a A Measurement Ontology Generalizable for Emerging Domain Applications on the Semantic

2012
Sven Schäge

We introduce a new and very weak security notion for signature schemes called target randomness security. In contrast to previous security definitions we focus on signature schemes with (public coin) probabilistic signature generation where the randomness used during signature generation is exposed as part of the signature. To prove practical usefulness of our notion we present a new signature ...

Journal: :International Journal of Applied Mathematics and Computer Science 2015

1996
Seema Maru Li Gong Roger Needham

assumptions about trusted synchronization paths and synchronization bounds between principals. This establishes requirements for evaluating the adequacy of the underlying clock synchronization algorithm. Also, it provides a metric for comparing protocol designs. For example, by modifying synchronization assumptions to reeect synchronization failures the designer can assess the extent of vulnera...

Journal: :IACR Cryptology ePrint Archive 2006
Jun Zhong Dake He

Abstract: On the basis of BB short signature scheme, this paper derives a new signature scheme, from which we construct a new kind of group signature scheme. The security of the new group signature scheme is based on the q-Strong Diffie-Hellman assumption and the Decisional Diffie-Hellman assumption in the random oracle model. The length of the new group signature is a little longer than that o...

2011
Lein Harn Chu-Hsing Lin

In this paper, we propose a notion of contract signature used in e-commerce applications. We propose a contract signature scheme based on the discrete logarithm assumption. The contract signature scheme adopts a digital multi-signature scheme in public-key cryptography to facilitate fair signature exchange over network. This proposed solution allows multiple signers of a contract signature to e...

2013
Devshri Satyarthi Y.P.S. Maravi Poonam Sharma R. K. Gupta

Today in the world of profit aiming mind, trust of people is at high risk where forgery is monotonous in which fake signature has come into limelight. The fraudulent signature thus needs to be verified using verification techniques. The signature forgery can be restricted by either online signature verification or offline signature verification techniques. Online signature on one hand verifies ...

2009
Erik Dahmen

Digital signatures are essential for the security of computer networks such as the Internet. For example, digital signatures are widely used to ensure the authenticity and integrity of updates for operating systems and other software applications. The security of the few practically used signature schemes is threatened by quantum computers. When large quantum computers are built, all currently ...

Journal: :Comput. J. 2015
Maryam Rajabzadeh Asaar Mahmoud Salmasizadeh Willy Susilo

The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multisignature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer’s identities in place of the public keys and their certificates. In the literature, most identitybased multi-proxy signature, proxy multi-signature and multi-proxy mult...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید