Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Dai-Rui Lin"'
Autor:
Dai-Rui Lin, 林岱銳
98
A digital signature technique has evolved into varies digital signature schemes in different application environments. In general, a digital signature consists of a random number and a hash function in addition to signing function. The random
A digital signature technique has evolved into varies digital signature schemes in different application environments. In general, a digital signature consists of a random number and a hash function in addition to signing function. The random
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/84963396637494970360
Autor:
Dai-Rui Lin, 林岱銳
90
Today, more and more multimedia are transmitted via Internet. During the transmitted process of data streams, the security issue is getting more important. Any kind of attacks, e.q. data forgery, modification, etc., will affect the system and
Today, more and more multimedia are transmitted via Internet. During the transmitted process of data streams, the security issue is getting more important. Any kind of attacks, e.q. data forgery, modification, etc., will affect the system and
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/96270851831349464976
Publikováno v:
The Florida Entomologist, 2014 Mar 01. 97(2), 597-604.
Externí odkaz:
https://www.jstor.org/stable/24362546
Publikováno v:
Journal of Network and Computer Applications. 34:12-19
In recent years, vehicle theft has become an increasing problem worldwide. A staggering number of cars are stolen every year, and up to half of these are never recovered. Thus, vehicle ownership identification is an important security issue. In this
Publikováno v:
ISDA (2)
One-time signature schemes (OTSS) are based on efficient one-way functions. They achieve fast signing and verification, and sign the message at most 1 time. OTSSs are used to replace asymmetric signatures that incur highercosts in cases where perform
Publikováno v:
2008 International Conference on Information Security and Assurance (isa 2008).
In this paper, we propose a method to enhance the security of Abdalla and Reyzin 's forward-secure signature scheme, by producing a backward-secure detection. In the proposed scheme, we embedded the hash-chain into the forward-secure signature scheme
Publikováno v:
Computer Standards & Interfaces. 31:319-320
In 2005, Lee et al. proposed a blind signature scheme based on the discrete-logarithm problem to achieve the untraceability or unlinkability property. Later, Wu and Wang proposed a simplified version of Lee et al.'s scheme. However, both of the two s
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2008 Eighth International Conference on Intelligent Systems Design & Applications; 2008, p472-478, 7p
Publikováno v:
2008 Eighth International Conference on Intelligent Systems Design & Applications; 2008, p608-613, 6p