Results 41 to 50 of about 156,809 (179)

Efficient Batch Verification for UP

open access: yes, 2018
Consider a setting in which a prover wants to convince a verifier of the correctness of k NP statements. For example, the prover wants to convince the verifier that k given integers N_1,...,N_k are all RSA moduli (i.e., products of equal length primes).
Reingold, Omer   +2 more
openaire   +3 more sources

Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles

open access: yesSensors, 2018
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies.
Jie Cui   +5 more
doaj   +1 more source

Fast Batch Verification of Multiple Signatures [PDF]

open access: yes, 2007
We propose an efficient batch verification of multiple signatures generated by different signers as well as a single signer. We first introduce a method to generate width-w Non-Adjacent Forms (w-NAFs) uniformly. We then propose a batch verification algorithm of exponentiations using w-NAF exponents, and apply this to batch verification for the modified
Jung Hee Cheon, Jeong Hyun Yi
openaire   +1 more source

CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs

open access: yesCryptography
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles.
Ahmad Kabil   +3 more
doaj   +1 more source

Integrating identity-based cryptography in IMS service authentication

open access: yes, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +6 more sources

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users [PDF]

open access: yes, 2018
Short Message Service (SMS) is a widely used communication medium for mobile applications, such as banking, social networking, and e-commerce. Applications of SMS services also include real-time broadcasting messages, such as notification of natural ...
Chaudhari, N. S.   +4 more
core   +3 more sources

FaceNet: A Unified Embedding for Face Recognition and Clustering

open access: yes, 2015
Despite significant recent advances in the field of face recognition, implementing face verification and recognition efficiently at scale presents serious challenges to current approaches.
Kalenichenko, Dmitry   +2 more
core   +1 more source

Support Neighbor Loss for Person Re-Identification

open access: yes, 2018
Person re-identification (re-ID) has recently been tremendously boosted due to the advancement of deep convolutional neural networks (CNN). The majority of deep re-ID methods focus on designing new CNN architectures, while less attention is paid on ...
Ding, Zhengming   +4 more
core   +1 more source

Prosodic-Enhanced Siamese Convolutional Neural Networks for Cross-Device Text-Independent Speaker Verification

open access: yes, 2018
In this paper a novel cross-device text-independent speaker verification architecture is proposed. Majority of the state-of-the-art deep architectures that are used for speaker verification tasks consider Mel-frequency cepstral coefficients. In contrast,
Dabouei, Ali   +5 more
core   +1 more source

Batch Computations Revisited: Combining Key Computations and Batch Verifications [PDF]

open access: yes, 2011
We consider the effect of combining the key computation step in particular key agreement protocols, such as ECMQV and static-DH, with verifying particular elliptic curve equations, such as those related to ECDSA signature verification. In particular, we show that one can securely combine ECDSA signature verification and ECMQV and static-ECDH key ...
openaire   +1 more source

Home - About - Disclaimer - Privacy