Results 11 to 20 of about 260,218 (282)

Security Analysis and Improvement of a Sever-aided Aggregate Verification Signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
To improve the security of server-aided aggregate verification signature,a new security model of server-aided aggregate verification signature against collusion and adaptive chosen message attacks is presented.It analyzes the security of server-aided ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +1 more source

Representative Ring Signature Algorithm Based on Smart Contract

open access: yesSensors, 2022
Traditional ring signature algorithms suffer from large signature data capacity and low speed of signature and verification during collective signing. In this work, we propose a representative ring signature algorithm based on smart contracts.
Qiude Li   +4 more
doaj   +1 more source

Complexity-Based Biometric Signature Verification [PDF]

open access: yes2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), 2017
On-line signature verification systems are mainly based on two approaches: feature- or time functions-based systems (a.k.a. global and local systems). However, new sources of information can be also considered in order to complement these traditional approaches, reduce the intra-class variability and achieve more robust signature verification systems ...
Tolosana, Ruben   +4 more
openaire   +1 more source

Batch Verification of Short Signatures [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Camenisch, Jan   +2 more
openaire   +3 more sources

Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition [PDF]

open access: yesSahand Communications in Mathematical Analysis, 2020
Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet ...
Atefeh Foroozandeh   +2 more
doaj   +1 more source

Online Signature Verification

open access: yesJournal of Forensic Document Examination, 2014
In this paper, the discriminative power of a set of features which seems to be relevant to signature analysis by Forensic Handwriting Experts (FHEs) is analyzed and particularly compared to the discriminative power of automatically selected feature sets. This analysis could help FHEs to further understand the signatures and the writer behaviour.
Plamondon R   +2 more
openaire   +5 more sources

On-Line Signature Verification

open access: yesAIJR Proceedings, 2021
In this paper, we are going to propose a new technique for On-Line signature based on global n local features. In general, shape of an on-line signature is used as a single discriminating feature. Sometimes shape of signature is used alone for verification purposes and sometimes it is used in combination with some other dynamic features such as ...
Swati M Patil, Poonam V Gaikwad
openaire   +1 more source

Empirical Evaluation of ECC Batch Verification Algorithms of Digital Signature in Wireless Sensor Network

open access: yesElectronics, 2022
Wireless sensor network (WSN) is an emerging topic in wireless communication where various sensor nodes are connected over the internet for data exchange.
Pankaj Kumar   +2 more
doaj   +1 more source

Practical On-Line Signature Verification [PDF]

open access: yes, 2009
Producción Científica A new DTW-based on-line signature verification system is presented and evaluated. The system is specially designed to operate under realistic conditions, it needs only a small number of genuine signatures to operate and it can be deployed in almost any signature capable capture device.
Pascual Gaspar, Juan Manuel   +2 more
openaire   +2 more sources

A Combined Method for On-Line Signature Verification

open access: yesCybernetics and Information Technologies, 2014
A combined method for on-line signature verification is presented in this paper. Moreover, all the necessary steps in developing a signature recognition system are described: signature data pre-processing, feature extraction and selection, verification ...
Boyadzhieva Desislava, Gluhchev Georgi
doaj   +1 more source

Home - About - Disclaimer - Privacy