23,972 Hits in 2.0 sec

Efficient online signature authentication approach

Saidani Kaouther, Mostefai Messaoud, Bouziane Abderraouf, Chahir Youssef
2014 Journal of Electronic Imaging (JEI)  
A new online hand signature authentication approach based on both signature and hand shape descriptor is proposed.  ...  The obtained test results [equal error rate ðEERÞ ¼ 2%, genuine acceptance rate ðGARÞ ¼ 96%] confirm the efficiency of the proposed approach.  ...  An efficient heuristic authentication approach based principally on the exploitation of both the hand signature and hand shape descriptor has been validated.  ... 
doi:10.1117/1.jei.23.6.063009 fatcat:uvq2547ahbfqvjai5yhycckrb4

A Framework for Authentication in Vehicular Ad-hoc Network using Identity based approach

R.Nasreen Salma
2013 IOSR Journal of Engineering  
ID-Based Signature (IBS) Scheme and the ID-Based Online / Offline Signature (IBOOS) Schemes are used, which provides authentication for the basic three types of communication in VANET, namely the vehicle  ...  Simulation result demonstrate that the use of IBS/IBOOS has improved reduced packet delivery ratio and decreased storage latency and hence this approach proves to be very suitable for VANET architecture  ...  of verification in the online phase, makes use of online signature & message and hence less time consuming and efficient).  ... 
doi:10.9790/3021-03731519 fatcat:6srirtisrvbehhoo5nx2bum7da

Accelerating authenticated emergence message propagation to mitigate chain-reaction accidents in highway traffic

Rongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen
2009 2009 Fourth International Conference on Communications and Networking in China  
In this paper, in order to accelerate the propagation, we propose a new online/offline Rabin signature scheme integrated in an authenticated emergence message propagation model.  ...  However, the long delay imposed by traditional signature based authentication may weaken the effectiveness of such message propagation.  ...  Specifically, we design a novel efficient online/offline Rabin signature scheme.  ... 
doi:10.1109/chinacom.2009.5339731 fatcat:dcwjs3rpi5ed5inmygusbg2fdi

An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures

Rehana Yasmin, Eike Ritter, Guilin Wang
2010 2010 10th IEEE International Conference on Computer and Information Technology  
identity based cryptography and online/offline signature schemes.  ...  identity based cryptography and online/offline signature schemes.  ...  ID-based Online/Offline Signature (IBOOS) Schemes: ID-based online/offline signature schemes are suitable for the proposed sensor broadcast authentication scheme.  ... 
doi:10.1109/cit.2010.165 dblp:conf/IEEEcit/YasminRW10 fatcat:gzagy4yj6bdofdm4l7yx3dinf4

Digital Signature Implementation as a New Smart Governance Model

Nursani Budiarti, Yahya Pandega Putra, Achmad Nurmandi
2020 Society  
Based on the analysis results using NVivo 12 Plus software, digital signature implementation is needed to anticipate cybercrime threats in effective, efficient, and accountable public services implementation  ...  This study uses a qualitative research method and data sources consisting of reference data from various previous studies and data sourced from national online media news.  ...  Three basic digital signature processes consist of checking signatory authentication, document authentication, and digital signature verification.  ... 
doi:10.33019/society.v8i2.222 fatcat:rxuaropaszeoxgu7ufpaujjjne

A novel ID-based authentication framework with adaptive privacy preservation for VANETs

Huang Lu, Jie Li, Mohsen Guizani
2012 2012 Computing, Communications and Applications Conference  
The ID-Based Signature (IBS) scheme and the ID-Based Online/Offline Signature (IBOOS) scheme are used, for authentication between the Road Side Units (RSUs) and vehicles, as well as authentication among  ...  System evaluation has been executed using efficient IBS and IBOOS schemes. It shows that, the proposed authentication framework with privacy preservation is suitable to the VANET environment.  ...  Step 1: We take an example to illustrate this approach, where vehicle w is aiming to authenticate with vehicle u with its online SIG w online .  ... 
doi:10.1109/comcomap.2012.6154869 fatcat:m7sr5aiknjcuphgf7bc3jcbetu

Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs [chapter]

Alwyn Goh, G. S. Poh, David C. L. Ngo
2003 Lecture Notes in Computer Science  
We present a stream authentication framework featuring preemptive one-time signatures and reactive hash-graphs, thereby enabling simultaneous realisation of near-online performance and packet-loss tolerance  ...  of WL stars, and (3) efficient loss-tolerance of GM chains; while compensating for various structural characteristics ie: (1) high overhead of one-time signatures and WL stars, and (2) loss-intolerance  ...  This paper describes stream authentication in a broad functional context, where online (or near-online) performance and packet-loss tolerance are both important.  ... 
doi:10.1007/978-3-540-45184-6_20 fatcat:uwdgwcxzknhj3buzhfqv6ebcbu

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

2018 KSII Transactions on Internet and Information Systems  
Until now, many stream authentication mechanisms have been proposed, but they are not efficient enough to be used in stream applications where the efficiency for sender and receiver sides are required  ...  Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks.  ...  In fact, since DL-SA is a kind of online/offline signature scheme [11, 12, 13, 14, 15, 16, 17, 18, 19, 20] using trapdoor hash function, the online signing can be efficiently processed by shifting computational  ... 
doi:10.3837/tiis.2018.06.026 fatcat:i4srnfz53rhsxkz45ngzg3sbma

Biometric Authentication and Identification using Behavioral Biometrics Technique of Signature Verification

The present study uses an ensemble approach, stacking to authenticate or validate a user by his signature and proposes a hybrid model using three algorithms namely, Random Tree, Logistic Regression & Multi-Layer  ...  Signature verification is one of the important aspects of biometric authentication which is slowly finding its use in certain niche organizations.  ...  Liu et al. (2015) [29] This paper tries to approach the problem of online signature verification using a discrete cosine transform (DCT) and sparse representation.  ... 
doi:10.35940/ijitee.i1106.0789s419 fatcat:macgt2t25jdqfnkizsj5hhrbi4

Efficient Online/Offline Signcryption Scheme

Baodian Wei, Fangguo Zhang, Xiaofeng Chen
2010 Intelligent Automation and Soft Computing  
In this paper, we propose a new signcryption scheme and its online/offline version from pairings.  ...  It is a challenge to achieve a goal of reaching greater efficiency than simply carrying out the signature and encryption operations separately.  ...  In the settings where both privacy and authentication are needed, it is a straightforward idea to compose these two schemes to construct a new authenticated encryption scheme [5, 6, 12] .  ... 
doi:10.1080/10798587.2010.10643092 fatcat:sfncgtfz4vc3fmocjps6fjmsei

Online Signature Verification using Dynamic Properties

EdigaLingappa, Geetavani.B., Jambula Hareesha
2017 International Journal of Scientific Research in Computer Sciences and Engineering  
This process is called as online signature verification.This signature based verification is used at banking where there is transaction of high value.  ...  For land registration, instead of signing the documents, we can use online signature which cannot be forged easily  ...  The importance of online signature verification [1] further adds to the motivation of the authentication system implemented.  ... 
doi:10.26438/ijsrcse/v5i6.3338 fatcat:cnjnw44vuvbprlv5w3ovqvkmqm

Using Challenge Questions for Student Authentication in Online Examination

Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker
2012 International Journal for Infonomics  
Online examination is an increasingly important component of online courses, and student authentication is widely seen as one of the major concerns for online examinations.  ...  We propose the use of profile based authentication framework (PBAF) together with user-id and password for the authentication of students during online examinations.  ...  PROFILE BASED AUTHENTICATION The proposed solution, Profile Based Authentication Framework (PBAF) uses multi modal authentication approach to secure online examination.  ... 
doi:10.20533/iji.1742.4712.2012.0072 fatcat:efc24riiqjcadkqulk4nmj5him

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs

Haojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Dongsheng Xing, Zhenfu Cao
2010 2010 Proceedings IEEE INFOCOM  
To exploit such a buffering characteristic, in this paper, we propose an Opportunistic Batch Bundle Authentication Scheme (OBBA) to achieve efficient bundle authentication.  ...  Public key signatures, which have been suggested in existing bundle security protocol specification, achieve bundle authentication at the cost of an increased computational, transmission overhead and a  ...  Utilizing Fragment Authentication Tree (FAT) to Achieve Efficient Fragment Authentication To reduce the number of signatures required and provide fragment authentication, one promising approach is that  ... 
doi:10.1109/infcom.2010.5462166 dblp:conf/infocom/ZhuLLSXC10 fatcat:ror7tz5cxngz5ormat4cpiafmq

Authentication System for Any Touch Devices Using DWT

Vasundhara M. Goslar, Mangala Madankar
2016 International Journal Of Engineering And Computer Science  
In online signature dynamic features are usually available. Genuine or Forgery signature is substantiating based features comparison.  ...  Each feature of an input signature is extracted using various steps discrete wavelet transform algorithm are matched against a reference signature to identify the genuine signature.  ...  This paper proposes an online authentication system algorithm that is suitable to deploy on mobile devices [1] . It is computationally space efficient algorithm for verifying signatures.  ... 
doi:10.18535/ijecs/v5i5.09 fatcat:cyfxueepmzfrjdwupyedmxxoay

An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment

Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen
2013 Information Technology and Control  
In this paper, we propose an efficient authenticated encryption scheme based on elliptic curve cryptography.  ...  Besides, it can be also applied to electronic auction, online meeting, and electronic voting.  ...  Compared with the signature-then-encryption approach, the authenticated encryption scheme has lower computation costs.  ... 
doi:10.5755/j01.itc.42.4.2150 fatcat:ockn3xyakjdzzj2pk5ev5n77si
« Previous Showing results 1 — 15 out of 23,972 results