نتایج جستجو برای: one time signature

تعداد نتایج: 3503131  

2010
Christian Rechberger

Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That’s also the reason why the widely used SHA-1 continues to be recommended in all applications except digital signatures after 2010. Recent work on preimage and second preimage attacks on reduced SHA-1 succeeding up to 48 out of 80 steps (with results barely below th...

Journal: :Int. J. Comput. Math. 2004
Shiang-Feng Tzeng Cheng-Ying Yang Min-Shiang Hwang

Problem statement: A digital signature scheme allows one to sign an electronic message and later the produced signature can be validated by the owner of the message or by any verifier. Most of the existing digital signature schemes were developed based on a single hard problem like factoring, discrete logarithm, residuosity or elliptic curve discrete logarithm problems. Although these schemes a...

Journal: :نشریه دانشکده فنی 0
مهدی آبادی سعید جلیلی

in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

2015
Mohammad Amjad

Now a days digital signature schemes stress on secure, authentication and verification mechanism of electronic signature used in electronic transaction system. In this sequence proxy digital signature may play an important role to achieve the security goals. Proxy Digital signature is the process of authorized signatory of the document by one person on behalf of other one. None of the proxy sig...

Journal: :journal of linear and topological algebra (jlta) 0
m nadja khah iran university of science and technology, tehran, iran. z pahlevani tehrani iran university of science and technology, tehran, iran.

this article concerned on the study of signature submanifolds for curves under lie group actions se(2), sa(2) and for surfaces under se(3). signature submanifold is a regular submanifold which its coordinate components are di erential invariants of an associated manifold under lie group action, and therefore signature submanifold is a key for solving equivalence problems.

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...

2003
Kemal BIÇAKCI Nazife BAYKAL

While the classical attack of “monitor the network and intercept the password” can be avoided by advanced protocols like SSH, one-time passwords are still considered a viable alternative or a supplement for software authentication since they are the only ones that safeguard against attacks on insecure client machines. In this paper by using public-key techniques we present a method called signa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1390

in this thesis, a better reaction conditions for the synthesis of spirobarbiturates catalyzed by task-specific ionic liquid (2-hydroxy-n-(2-hydroxyethyl)-n,n-dimethylethanaminium formate), calcium hypochlorite ca(ocl)2 or n-bromosuccinimide (nbs) in the presence of water at room temperature by ultrasonic technique is provided. the design and synthesis of spirocycles is a challenging task becaus...

Journal: :International Journal of Astronomy and Astrophysics 2022

The idea of an oscillating Universe has remained a topic interest even after the discovery dark energy. This paper confirms this by means another well-established theory in general relativity, embedding curved spacetimes higher-dimensional flat spacetimes: n-dimensional Riemannian space is said to be class m if +n lowest dimension which given can embedded; here . So four-dimensional two and the...

Journal: :International journal of engineering and innovative research 2021

With the acceleration of digitalization in all areas our lives, need for biometric verification methods is increasing. The fact that data unique and stronger against phishing attacks compared to password-based authentication methods, has increased its preference rate. Signature verification, which one types, plays an important role many such as banking systems, administrative judicial applicati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید