نتایج جستجو برای: signature verification

تعداد نتایج: 138762  

Journal: :I. J. Network Security 2011
Kitae Kim Ikkwon Yie Seongan Lim Daehun Nyang

Batch cryptography has been developed into two main branches batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially by ...

2014
Y.Bevish Jinila K. Komathy

Authentication of safety messages in Vehicular Ad hoc Networks (VANET) plays a major role. The time take for signature generation and verification should be very less, to provide a secure and comfortable transportation to the public. Several signature generation and verification schemes are proposed in the literatures. This paper focusses on the usage of Cha Cheon’s ID based signature scheme fo...

2003
Mohammad M. Shafiei Hamid R. Rabiee

In this paper, a new on-line handwritten signature verification system using Hidden Markov Model (HMM) is presented. The proposed system segments each signature based on its perceptually important points and then computes for each segment a number of features that are scale and displacement invariant. The resulted sequence is then used for training an HMM to achieve signature verification. Our ...

2007
Haodong Wang Bo Sheng Chiu C. Tan Qun Li

While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytograp...

2009
Erik Dahmen Christoph Krauß

We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measurements like the temperature, signature generation is 7 times faster and verification is 158 times faster than state-of-the-art implementations of ECDSA at the same security level. For message lengths sufficient for most s...

2014
Fahad Layth Malallah Syed Ahmad Abdul Rahman Wan Adnan Salman bin Yussof

This paper describes a novel approach to a cancelable template protection scheme that secures online handwritten signature samples in the reference database of a biometric verification system. We propose a renewable-noninvertible transformation process named Bio-Trigono comprising two consecutive steps. First, a shuffling scheme is applied to a signature sample to attain the renewability proper...

2003
L. T. KONG H. Y. OOI F. MOHD - YASIN

This paper describes the modeling of a signature verification and forgery detection system that allows for efficient hardware implementation. The system follows five steps to perform the signature verification which are data acquisition, preprocessing, comparison process and decision process. Fuzzy inference system is used as the core decision maker for verifying the signature. The design is fo...

2005
Ashish Dhawan Aditi R. Ganesan

2009
Aitor Mendaza-Ormaza Oscar Miguel-Hurtado Ivan Rubio-Polo Raul Alonso-Moreno

Handwritten signature has long been established as the most diffuse mean for personal verification in our daily life. It is commonly, in general, in all kind of legal documents and transactions. Therefore, within all biometric modalities, signature is probably the widest accepted. On the other hand, signature is a behavioural characteristic of individuals, and therefore is considered being weak...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید