نتایج جستجو برای: one time signature

تعداد نتایج: 3503131  

Journal: :J. Inf. Sci. Eng. 2006
Yongsu Park Yookun Cho

When one-time signatures are used for stream authentication, one of the most serious drawbacks is that their large signature size yields high communication overhead. In this paper, we present two efficient one-time signature schemes for stream authentication. Compared with the previous schemes, these schemes have the smallest signature sizes. Moreover, their verification overheads are low. The ...

Journal: :IACR Cryptology ePrint Archive 2010
Paulo S. L. M. Barreto Rafael Misoczki

We describe a one-time signature scheme based on the hardness of the syndrome decoding problem, and prove it secure in the random oracle model. Our proposal can be instantiated on general linear error correcting codes, rather than restricted families like alternant codes for which a decoding trapdoor is known to exist.

Journal: :JNW 2006
Shidi Xu Yi Mu Willy Susilo

Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the security of MANET is still a challenge issue. Although there are some existing security schemes such as ARAN (Authenticated Routing for Ad hoc Networks) protocol that makes use of cryptographic certificate to provide end-to-...

Journal: :journal of advances in computer research 2013
mohammad mohammadzade alireza ghonodi

the problem of automatic signature recognition has received little attention incomparison with the problem of signature verification, despite its potentialapplications for many business processes and can be used effectively in paperlessoffice projects. this paper presents model-based off-line signature recognition withrotation invariant features. non-linear rotation of signature patterns is one...

A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...

A. H. Zaeim A. Haji-Badali, R. Karami

When Einstein was thinking about the theory of general relativity based on the elimination of especial relativity constraints (especially the geometric relationship of space and time), he understood the first limitation of especial relativity is ignoring changes over time. Because in especial relativity, only the curvature of the space was considered. Therefore, tensor calculations should be to...

2002
Jianguo Zhang Tieniu Tan

In this paper, we present a theoretically and computationally simple but efficient approach for rotation invariant texture classification. This method is based on new texture signatures extracted from spectrum. Rotation invariant texture features are obtained based on the extension of the derived signatures. The features are tested with 1000 randomly rotated samples of 20 Brodatz texture classe...

Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...

Mehdi Abadi Sa'eed Jalili

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1376

saluk mount is selected for devonian biostratigraphy. this area located at southwest of bojnurd. in this study three sections are selected and two sections, chahar-borj and tabar sections with a thickness of 650 m, which consist mainly of calcareous sediments was studied in detailed but third section, qelli section, with a thickness of about 450m which consist mainly of sandstone and evaporates...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید