Filters








6,278 Hits in 4.1 sec

Blank Digital Signatures: Optimization and Practical Experiences [chapter]

David Derler, Christian Hanser, Daniel Slamanig
2015 IFIP Advances in Information and Communication Technology  
Blank Digital Signatures give rise to a lot of interesting applications, and, accordingly, the question arises how a BDS scheme would perform in a practical implementation, and to which extent it can be  ...  Blank Digital Signatures (BDS) [18] are a special instance of proxy-type digital signatures, allowing an originator to define and issue a signature on a template, containing fixed and exchangeable elements  ... 
doi:10.1007/978-3-319-18621-4_14 fatcat:malam7jrhzfxha7ffwictgq7fm

Print signatures for document authentication

Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
2003 Proceedings of the 10th ACM conference on Computer and communication security - CCS '03  
We present theoretical and experimental details on how to register as well as authenticate this print signature. The security analysis of this technique is also presented.  ...  These features along with some important document content is then captured as the print signature.  ...  The experiments demonstrate the uniqueness and randomness of our proposed print signature.  ... 
doi:10.1145/948129.948131 fatcat:62hl4sxufzcgtenb5f7npcmntm

Print signatures for document authentication

Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli
2003 Proceedings of the 10th ACM conference on Computer and communication security - CCS '03  
We present theoretical and experimental details on how to register as well as authenticate this print signature. The security analysis of this technique is also presented.  ...  These features along with some important document content is then captured as the print signature.  ...  The experiments demonstrate the uniqueness and randomness of our proposed print signature.  ... 
doi:10.1145/948109.948131 dblp:conf/ccs/ZhuWK03 fatcat:bbpc3afqdvbefdu5bodv7msyje

An Appraisal of Off-line Signature Verification Techniques

Abdul Salam Shah, M. N. A. Khan, Asadullah Shah
2015 International Journal of Modern Education and Computer Science  
Hand written Signature of an individual is also unique and for identification of humans are being used and accepted specially in the banking and other financial transactions.  ...  Pattern Recognition and image processing are the major areas where research on signature verification is carried out.  ...  Rafique and Khan [29] explored various methods, practices and tools being used for static and live digital forensics.  ... 
doi:10.5815/ijmecs.2015.04.08 fatcat:myup4qed2zg25g3i43fc2hjil4

The Electrophysiological Signature of Mind Wandering [article]

Stefan Arnau, Christoph Loeffler, Jan Rummel, Dirk Hagemann, Edmund Wascher, Anna-Lena Schubert
2019 bioRxiv   pre-print
Mind wandering during ongoing tasks can impede task performance and increase the risk of failure in laboratory as well as in daily-life tasks and work environments.  ...  Measurements of alpha power may therefore be used to detect mind wandering online during critical tasks in traffic and industry in order to prevent failures.  ...  Acknowledgements We would like to thank Emily Brett, Isabel Gebhardt, Sarah Hladik, and Niklas Neumann for their assistance in collecting the data as well as Gidon Frischkorn for programming the experiment  ... 
doi:10.1101/819805 fatcat:7tm2wm4u25hxfoum2l2wrnnhoi

Signature Verification Using Neural Network

K. Priyadarshini, Nisanth Sai. A, P. Sai Krishna, Dr. Shruti Bhargava Choubey
2022 International Journal for Research in Applied Science and Engineering Technology  
The suggested scheme discriminates between original and the forged signatures using artificial neural network (ANN) for training and verification of signatures.  ...  Abstract: In this paper we are about to present a latest improved off-line signature verification system using global and texture features of the signatures.  ...  Online Signature Recognition & Verification Online signature recognition and verification refers to a process where the user's signature is acquired on a digital device.  ... 
doi:10.22214/ijraset.2022.40948 fatcat:kgpiqwv2n5gdvaie7cmmdybuei

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures [chapter]

Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
2017 Lecture Notes in Computer Science  
Sanitizable signatures are a variant of digital signatures where a designated party (the sanitizer) can update admissible parts of a signed message.  ...  Concrete real-world applications of SSSs include secure routing, privacy-preserving document disclosure, anonymous credentials, group content protection, and blank signatures [3, 12, 13, 14, 20, 21, 24  ...  Introduction Digital signatures are an important means to protect the integrity and authenticity of digital data.  ... 
doi:10.1007/978-3-319-60055-0_23 fatcat:r4od3vnre5gifmln72rrek4qxm

Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks

Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza
2017 ACM Transactions on Embedded Computing Systems  
In addition, we show the cost of ECDSA signatures can be reduced of up to a factor 10 by using harvesting-aware optimizations.  ...  In this paper we propose techniques to make ECDSA signatures low cost and implementable on resourceconstrained devices.  ...  experiments using reallife energy traces, and practical experiments in a testbed of solar-powered Telos B motes. 5.3.1.  ... 
doi:10.1145/2994603 fatcat:dso3g3az7rd7rgu75tteybut5q

XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions [chapter]

Johannes Buchmann, Erik Dahmen, Andreas Hülsing
2011 Lecture Notes in Computer Science  
It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family.  ...  Its signature size is reduced to less than 25% compared to the best provably secure hash based signature scheme.  ...  Introduction Digital signatures are a very important cryptographic tool. The signature schemes currently used in practice are RSA, DSA, and ECDSA.  ... 
doi:10.1007/978-3-642-25405-5_8 fatcat:rteojej5rnfpfiountjk4hgwni

Motor signatures in digitized cognitive and memory tests enhances characterization of Parkinson's disease [article]

Jihye Ryu, Elizabeth B Torres
2022 medRxiv   pre-print
Results: The stochastic signatures of the fluctuations in pen drawing speed and voice amplitude of patients with PD show lower noise-to-signal ratio compared to those derived from the younger and age-matched  ...  Methods: 35 participants including patients with PD, healthy young and age-matched controls performed a series of drawing and memory tasks, while their pen movement and voice were digitized.  ...  These digitized clinical assays can be very revealing of the personalized signatures and of the cohort's signatures and trends.  ... 
doi:10.1101/2022.03.28.22272824 fatcat:jhhmbqcg7rb4dgdmqrn2yrte2e

Neural Signatures of Gender Differences in Interpersonal Trust

Yan Wu, Alisha S. M. Hall, Sebastian Siehl, Jordan Grafman, Frank Krueger
2020 Frontiers in Human Neuroscience  
In this study, we used functional magnetic resonance imaging (fMRI) to investigate the neural signatures of gender differences in trust by simultaneously scanning 11 male and 11 female same-gender, fixed  ...  Parental investment theory and social role theory predict that women trust less than men due to a higher sensitivity to risk and betrayal, while men trust more than women to maximize resources and to signal  ...  Armstrong, and M. Ulrich for help in various stages of this project, and A. Butz for help in programming the fMRI experiment. We also thank J. Bodurka and S.  ... 
doi:10.3389/fnhum.2020.00225 pmid:32612518 pmcid:PMC7309600 fatcat:iepheekv25f2nldgegw6g5kdru

Approaches and Issues in Offline Signature Verification System

Hemanta Saikia, Kanak Chandra Sarma
2012 International Journal of Computer Applications  
Type of operations in Preprocessing, Feature Extraction and Classification depend on the signature pattern.  ...  In this paper, we have presented a survey of various approaches and issues related to offline signature verification systems.  ...  Data Acquisition For offline signature verification system, images of the signatures are scanned using a digital scanner. Scanned images are stored digitally for offline processing.  ... 
doi:10.5120/5780-8035 fatcat:2w3xlsgbvbby3ignsldied2wfq

Spectral Signatures of Surface Materials in Pig Buildings

G. Zhang, J.S. Strøm, M. Blanke, I. Braithwaite
2006 Biosystems Engineering  
Experience shows that the performance of such robots is poor regarding effectiveness of cleaning and utilisation of water.  ...  The spectral signatures of the surface materials and dirt attached to the surfaces showed that it is possible to make discrimination and hence to classify areas that are visually clean.  ...  Innovation and the Ministry of Food Agriculture and Fisheries under Grant number 2053-01-0021.  ... 
doi:10.1016/j.biosystemseng.2006.05.002 fatcat:utoziyn7qvbb5ltcnlukhfrcma

Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs

Jeonghyuk Lee, Jihye Kim, Hyunok Oh
2021 IEEE Access  
The experiment results show that our signature scheme yields 12 s for signing time, 1 ms for verification time, 25 s for aggregation time, with the 1.6 KB secret key size and signature size independent  ...  Our proposal has constant complexities in key/signature sizes, signature generation, and verification time.  ...  Bellare and Miner [5] formalize the security notion and present the first practical forward secure signature scheme.  ... 
doi:10.1109/access.2021.3093925 fatcat:6nmddj5jsnfdhppl43labljyqy

Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network [article]

Mukta Rao, Nipur, Vijaypal Singh Dhaka
2010 arXiv   pre-print
The associatie memory feature of the Hopfield type recurrent neural network is used for the pattern storage and pattern authentication.This paper outlines an optimization relaxation approach for signature  ...  verification based on the Hopfield neural network (HNN)which is a recurrent network.The standard sample signature of the customer is cross matched with the one supplied on the Cheque.The difference percentage  ...  copy of the signature card, or a stored digital image of the signature card.  ... 
arXiv:1006.2684v1 fatcat:l3tmbwb7nfcwjd4u6otlyr5cdu
« Previous Showing results 1 — 15 out of 6,278 results