Loading [a11y]/accessibility-menu.js
IEEE Xplore Search Results

Showing 1-25 of 1,070 resultsfor

Results

The eXtended Merkle Signature Scheme (XMSS) is a post-quantum secure signature scheme that is resistant to quantum attacks and has gained significant attention in recent years. This paper proposes an innovative XMSS configurable cryptographic hardware circuit based on hash functions SM3 and SHA-256. By reusing the computational circuits of the hash functions, the proposed design reduces hardware r...Show More
In this article, we design a secured digital signature based on properties of non-commutative group. The security of digital signature is based on the hardness of the Factor problem over non-commutative groups. We believe that the Factor problem over non-commutative groups is NP hard. To promote this towards implementation strongly, we will demonstrate the digital signature in singular groups like...Show More
In the current digital era, the security of official documents and digital signatures is becoming increasingly important to prevent the spread of false information or manipulated documents. This research aims to design, develop, and implement a web-based application that we call SIGNIN that addresses the issues of official document validity and digital signature security. The research methodology ...Show More
With the rapid development of Internet technology, the spread of information and the arrival of the big data era, data security is becoming more and more important, in the process of data transmission is to solve the first problem of identification and data privacy of both sides, these problems have to rely on cryptography to solve, but with the explosive growth of Internet users in recent years, ...Show More
A new type of authenticated encryption schemes combined signature with message recovery schemes and symmetric encryption schemes together. It was an authenticated encryption without using Hash functions or Redundancy functions. However, we found the scheme does not have a digital signature of the basic conditions required, and can not resist the forgery attack of the news recipient, At the same ti...Show More
Along with the rapid development of Internet communication and e-commerce technology, the security is becoming more and more important. Digital signature technology by using hash function can effectively address the security issue. This paper presented a new iterated hash function based on a hyperchaotic cellular neural network system and a double-pipe structure in order to obtain the better crypt...Show More
Recent advances in quantum-computing technology have threatened the security of classical cryptographic algorithms. This initiated research on Post-Quantum Cryptography (PQC), and the National Institute of Standards and Technology (NIST) PQC standardization is in progress. Coping with the current situation in which the security of existing cryptographic algorithms is already in question and that o...Show More
Deterministic Wallet (DW) and Stealth Address (SA) mechanisms have been widely adopted in the cryptocurrency community, due to their virtues on functionality and privacy protection, which come from a key derivation mechanism that allows an arbitrary number of derived keys to be generated from a master key. However, these algorithms suffer a vulnerability that, when one derived key is compromised s...Show More
Most current research approaches for functional/effective connectivity analysis focus on pair-wise connectivity and cannot deal with network-scale functional interactions. In this paper, we propose a structurally-weighted LASSO (SW-LASSO) regression model to represent the functional interaction among multiple regions of interests (ROIs) based on resting state fMRI (R-fMRI) data. The structural con...Show More
This research investigates efficient architectures for the implementation of the CRYSTALS-Dilithium post-quantum digital signature scheme on reconfigurable hardware, in terms of speed, memory usage, power consumption and resource utilisation. Post quantum digital signature schemes involve a significant computational effort, making efficient hardware accelerators an important contributor to future ...Show More
Active networks represent a new approach to network architecture. Active networks provide a much more flexible network infrastructure than traditional networks do. Flexibility is a powerful merit of active networks, but it can raise considerable security problems. Current active network researches have applied diverse techniques to solve them. Cryptography is one way of protecting active networks....Show More
Smart Disclosure, a new concept proposed by the U.S. government, has been widely accepted by the advanced countries globally. Previously, our team has built a personal data exchange system based on the Green Button open-source project to assist in achieving Smart Disclosure by realizing two core requirements, DMD (Download My Data) and CMD (Connect My Data). However, several issues still need to b...Show More
With the widespread adoption of digital signature technology, when a signer needs to perform numerous signature activities but has limited computing power, the efficiency of the general signature scheme can be severely restricted. To address this challenge, the linearly homomorphic signature scheme with a designated combiner (LHSDC) allows the signer to transfer the primary computing task to a clo...Show More

Automatic on-line signature verification

V.S. Nalwa

Proceedings of the IEEE
Year: 1997 | Volume: 85, Issue: 2 | Journal Article |
Automatic on-line signature verification is an intriguing intellectual challenge with many practical applications. I review the context of this problem and then describe my own approach to it, which breaks with tradition by relying primarily on the detailed shape of a signature for its automatic verification, rather than relying primarily on the pen dynamics during the production of the signature....Show More

Automatic on-line signature verification

V.S. Nalwa

Year: 1997 | Volume: 85, Issue: 2 | Journal Article |
We implemented two direct methods for on-line signature verification. First, data produced by a graphics tablet describing a signature to be tested are treated with wavelet transforms to generate features to be nonlinearly confronted with a reference signature chosen among 10 previously stored from the same writer. In order to recover the time dependence lost in the wavelet treatment, we included ...Show More

An Adaptively Secure Functional Encryption for Randomized Functions

;

The Computer Journal
Year: 2020 | Volume: 63, Issue: 1 | Journal Article |
Functional encryption (FE) can provide a fine-grained access control on the encrypted message. Therefore, it has been applied widely in security business. The previous works about functional encryptions most focused on the deterministic functions. The randomized algorithm has wide application, such as securely encryption algorithms against chosen ciphertext attack, privacy-aware auditing. Based on...Show More

An Adaptively Secure Functional Encryption for Randomized Functions

;

Year: 2020 | Volume: 63, Issue: 1 | Journal Article |
Current deconvolution algorithms for functional magnetic resonance imaging (fMRI) data are hindered by widespread signal changes arising from motion or physiological processes (e.g. deep breaths) that can be interpreted incorrectly as neuronal-related hemodynamic events. This work proposes a novel deconvolution approach that simultaneously estimates global signal fluctuations and neuronal-related ...Show More
Human connectomes constructed via neuroimaging data offer a comprehensive description of the macro-scale structural connectivity within the brain. Thus quantitative assessment of connectome-scale structural and functional connectivities will not only fundamentally advance our understanding of normal brain organization and function, but also have significant importance to systematically and compreh...Show More
The safe exchange of information is one of the key issues in electronic emergency command system; in view of this, the needs of information exchange in the emergency system were introduced; the transfer process and encryption of information exchange business and the problem of multi-digital signature to be solved in the emergency system was analyzed; the information exchange model and its affairs ...Show More
The aim of this work is to introduce a new way of transparently securing multicast services, optimized for satellite networks. Security of multicast data is becoming an important issue to operators and users of satellite networks. This paper presents a secure multicast architecture that fits well into the satellite areas. Multicast service scenarios with detailed security architecture are presente...Show More
Programmable networks represent a new approach to network architecture. It provides a much more flexible network infrastructure than traditional networks do. Flexibility is a powerful merit of programmable networks, but it can raise considerable security problems. Current programmable network researches have applied diverse techniques to solve them. Cryptographic technique is one way of protecting...Show More
Various gene-expression signatures for breast cancer are available for prediction of clinical outcome, but due to small overlap between different signatures, it is challenging to integrate existing disjoint signatures to provide a unified insight on the association between gene expression and clinical outcome. In this paper, we proposed a method to identify reliable breast cancer gene signature fr...Show More
Homomorphic signature scheme with a designated evaluator extends traditional signature schemes by allowing only a specified entity to perform homomorphic operations on the signatures. However, existing schemes of this type are restricted to linear computations in their homomorphic evaluations, limiting their applicability in broader contexts. In this paper, we propose the first generic constructio...Show More
Contract in service commerce is crucial. Contract signing can be time consuming and costly process, especially if buyer and seller are far from each other. This problem can be solved by using digital signature. We propose a method for contract signing which can be proved with signer identity card. Using this method, buyer and seller can check and signed their document conveniently using web applic...Show More
In era digitalization, there are many governments still using conventional business processes. The E-Disposition application is made according to the analysis of functional, non-functional requirements and security requirement in Office Electronic Manuscripts (OEM) and Electronic Government System (EGS) regulations in Indonesia. The E-Disposition application was built as a solution to replace the ...Show More

Standards Dictionary Terms