Results 21 to 30 of about 36,354 (259)

Efficient Certificateless Aggregate Signcryption Scheme with Public Verifiability [PDF]

open access: yesJisuanji gongcheng, 2022
Signcryption technology is the foundation of building a network trust system, which can ensure the confidentiality, integrity and verifiability of data.However, when a large number of users perform signcryption at the same time, the verification takes a ...
CHEN Hong, HOU Yuting, GUO Pengfei, ZHOU Mo, ZHAO Jufang, XIAO Chenglong
doaj   +1 more source

A Secure and Efficient Group Key Agreement Scheme for VANET

open access: yesSensors, 2019
A vehicular ad hoc network (VANET) is a special mobile ad hoc network that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake).
Lianhai Liu   +3 more
doaj   +1 more source

Sistem Verifikasi Kekerabatan berbasis 3D ResNet-18 menggunakan Jetson Nano

open access: yesJurnal Elkomika, 2023
ABSTRAK Verifikasi kekerabatan berbasis citra wajah merupakan salah satu penerapan sistem Artificial Intelligence yang berguna dalam kehidupan, misalnya untuk penyelidikan kriminal, analisis silsilah, dan lainnya.
FAUZAN AWWAL MUKHRODI   +3 more
doaj   +1 more source

CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing

open access: yesIEEE Access, 2019
With growing popularity of cloud storage, the number of users of outsourcing data to cloud servers has increased dramatically. On the one hand, the rapidly increasing volume of data in the cloud is accompanied by a lot of data duplication.
Jiaojiao Wu   +3 more
doaj   +1 more source

CNN with Batch Normalization Adjustment for Offline Hand-written Signature Genuine Verification

open access: yesJOIV: International Journal on Informatics Visualization, 2023
Signature genuine verifications of offline hand-written signatures are critical for preventing forgery and fraud. With the growth of protecting personal identity and preventing fraud, the demand for an automatic system for signature verification is high.
Wifda Muna Fatihia   +2 more
doaj   +1 more source

A Simple Distortion-Free Method to Handle Variable Length Sequences for Recurrent Neural Networks in Text Dependent Speaker Verification

open access: yesApplied Sciences, 2020
Recurrent neural networks (RNNs) can model the time-dependency of time-series data. It has also been widely used in text-dependent speaker verification to extract speaker-and-phrase-discriminant embeddings. As with other neural networks, RNNs are trained
Sung-Hyun Yoon, Ha-Jin Yu
doaj   +1 more source

Efficient anonymous authentication scheme for automatic dependent surveillance‐broadcast system with batch verification

open access: yesIET Communications, 2021
Automatic Dependent Surveillance‐Broadcast (ADS‐B) system provides significant improvements in air traffic control system such as optimal routing in non‐radar environments with a new level of safety and efficiency.
Jegadeesan Subramani   +3 more
doaj   +1 more source

Attacking and Repairing Batch Verification Schemes [PDF]

open access: yes, 2000
Batch verification can provide large computational savings when several signatures, or other constructs, are verified together. Several batch verification algorithms have been published in recent years, in particular for both DSA-type and RSA signatures. We describe new attacks on several of these published schemes.
Colin Boyd, Chris Pavlovski
openaire   +1 more source

Efficient Pairing-Free Certificateless Authentication Scheme With Batch Verification for Vehicular Ad-Hoc Networks

open access: yesIEEE Access, 2018
The continuous progress of the wireless communication technology provides an intelligent and efficient transportation system through vehicular ad-hoc networks (VANETS) to mitigate traffic jams and road fatalities, which improves safety of passengers and ...
N.B. Gayathri   +3 more
doaj   +1 more source

Security of interactive DSA batch verification

open access: yesElectronics Letters, 1994
The authors show that the interactive DSA (digital signature algorithm) batch transaction protocol proposed by Naccache et al. (see Pre-Proceedings Eurocrypt'94, p. 85-94, 1994) is not secure.
LEE, PJ, LIM, CH
openaire   +2 more sources

Home - About - Disclaimer - Privacy