نتایج جستجو برای: one time signature
تعداد نتایج: 3503131 فیلتر نتایج به سال:
When one-time signatures are used for stream authentication, one of the most serious drawbacks is that their large signature size yields high communication overhead. In this paper, we present two efficient one-time signature schemes for stream authentication. Compared with the previous schemes, these schemes have the smallest signature sizes. Moreover, their verification overheads are low. The ...
We describe a one-time signature scheme based on the hardness of the syndrome decoding problem, and prove it secure in the random oracle model. Our proposal can be instantiated on general linear error correcting codes, rather than restricted families like alternant codes for which a decoding trapdoor is known to exist.
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the security of MANET is still a challenge issue. Although there are some existing security schemes such as ARAN (Authenticated Routing for Ad hoc Networks) protocol that makes use of cryptographic certificate to provide end-to-...
the problem of automatic signature recognition has received little attention incomparison with the problem of signature verification, despite its potentialapplications for many business processes and can be used effectively in paperlessoffice projects. this paper presents model-based off-line signature recognition withrotation invariant features. non-linear rotation of signature patterns is one...
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
When Einstein was thinking about the theory of general relativity based on the elimination of especial relativity constraints (especially the geometric relationship of space and time), he understood the first limitation of especial relativity is ignoring changes over time. Because in especial relativity, only the curvature of the space was considered. Therefore, tensor calculations should be to...
In this paper, we present a theoretically and computationally simple but efficient approach for rotation invariant texture classification. This method is based on new texture signatures extracted from spectrum. Rotation invariant texture features are obtained based on the extension of the derived signatures. The features are tested with 1000 randomly rotated samples of 20 Brodatz texture classe...
Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...
In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...
saluk mount is selected for devonian biostratigraphy. this area located at southwest of bojnurd. in this study three sections are selected and two sections, chahar-borj and tabar sections with a thickness of 650 m, which consist mainly of calcareous sediments was studied in detailed but third section, qelli section, with a thickness of about 450m which consist mainly of sandstone and evaporates...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید