نتایج جستجو برای: signature verification
تعداد نتایج: 138762 فیلتر نتایج به سال:
Batch cryptography has been developed into two main branches batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially by ...
Authentication of safety messages in Vehicular Ad hoc Networks (VANET) plays a major role. The time take for signature generation and verification should be very less, to provide a secure and comfortable transportation to the public. Several signature generation and verification schemes are proposed in the literatures. This paper focusses on the usage of Cha Cheon’s ID based signature scheme fo...
In this paper, a new on-line handwritten signature verification system using Hidden Markov Model (HMM) is presented. The proposed system segments each signature based on its perceptually important points and then computes for each segment a number of features that are scale and displacement invariant. The resulted sequence is then used for training an HMM to achieve signature verification. Our ...
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytograp...
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measurements like the temperature, signature generation is 7 times faster and verification is 158 times faster than state-of-the-art implementations of ECDSA at the same security level. For message lengths sufficient for most s...
This paper describes a novel approach to a cancelable template protection scheme that secures online handwritten signature samples in the reference database of a biometric verification system. We propose a renewable-noninvertible transformation process named Bio-Trigono comprising two consecutive steps. First, a shuffling scheme is applied to a signature sample to attain the renewability proper...
This paper describes the modeling of a signature verification and forgery detection system that allows for efficient hardware implementation. The system follows five steps to perform the signature verification which are data acquisition, preprocessing, comparison process and decision process. Fuzzy inference system is used as the core decision maker for verifying the signature. The design is fo...
Handwritten signature has long been established as the most diffuse mean for personal verification in our daily life. It is commonly, in general, in all kind of legal documents and transactions. Therefore, within all biometric modalities, signature is probably the widest accepted. On the other hand, signature is a behavioural characteristic of individuals, and therefore is considered being weak...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید