Results 21 to 30 of about 36,354 (259)
Efficient Certificateless Aggregate Signcryption Scheme with Public Verifiability [PDF]
Signcryption technology is the foundation of building a network trust system, which can ensure the confidentiality, integrity and verifiability of data.However, when a large number of users perform signcryption at the same time, the verification takes a ...
CHEN Hong, HOU Yuting, GUO Pengfei, ZHOU Mo, ZHAO Jufang, XIAO Chenglong
doaj +1 more source
A Secure and Efficient Group Key Agreement Scheme for VANET
A vehicular ad hoc network (VANET) is a special mobile ad hoc network that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake).
Lianhai Liu +3 more
doaj +1 more source
Sistem Verifikasi Kekerabatan berbasis 3D ResNet-18 menggunakan Jetson Nano
ABSTRAK Verifikasi kekerabatan berbasis citra wajah merupakan salah satu penerapan sistem Artificial Intelligence yang berguna dalam kehidupan, misalnya untuk penyelidikan kriminal, analisis silsilah, dan lainnya.
FAUZAN AWWAL MUKHRODI +3 more
doaj +1 more source
CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu +3 more
doaj +1 more source
CNN with Batch Normalization Adjustment for Offline Hand-written Signature Genuine Verification
Signature genuine verifications of offline hand-written signatures are critical for preventing forgery and fraud. With the growth of protecting personal identity and preventing fraud, the demand for an automatic system for signature verification is high.
Wifda Muna Fatihia +2 more
doaj +1 more source
Recurrent neural networks (RNNs) can model the time-dependency of time-series data. It has also been widely used in text-dependent speaker verification to extract speaker-and-phrase-discriminant embeddings. As with other neural networks, RNNs are trained
Sung-Hyun Yoon, Ha-Jin Yu
doaj +1 more source
Automatic Dependent Surveillance‐Broadcast (ADS‐B) system provides significant improvements in air traffic control system such as optimal routing in non‐radar environments with a new level of safety and efficiency.
Jegadeesan Subramani +3 more
doaj +1 more source
Attacking and Repairing Batch Verification Schemes [PDF]
Batch verification can provide large computational savings when several signatures, or other constructs, are verified together. Several batch verification algorithms have been published in recent years, in particular for both DSA-type and RSA signatures. We describe new attacks on several of these published schemes.
Colin Boyd, Chris Pavlovski
openaire +1 more source
The continuous progress of the wireless communication technology provides an intelligent and efficient transportation system through vehicular ad-hoc networks (VANETS) to mitigate traffic jams and road fatalities, which improves safety of passengers and ...
N.B. Gayathri +3 more
doaj +1 more source
Security of interactive DSA batch verification
The authors show that the interactive DSA (digital signature algorithm) batch transaction protocol proposed by Naccache et al. (see Pre-Proceedings Eurocrypt'94, p. 85-94, 1994) is not secure.
LEE, PJ, LIM, CH
openaire +2 more sources

