Results 31 to 40 of about 260,218 (282)
Speeding-up verification of digital signatures
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Taleb, Abdul Rahman, Vergnaud, Damien
openaire +4 more sources
Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions
Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors.
Hussein Walid +2 more
doaj +1 more source
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
Signature Verification Approach using Fusion of Hybrid Texture Features
In this paper, a writer-dependent signature verification method is proposed. Two different types of texture features, namely Wavelet and Local Quantized Patterns (LQP) features, are employed to extract two kinds of transform and statistical based ...
Alaei, Alireza +2 more
core +1 more source
Online Signature Verification Using Fourier Descriptors [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yanıkoğlu, Berrin, Kholmatov, Alisher
openaire +4 more sources
Offline Signature Verification (OSV) is a challenging pattern recognition task, especially when it is expected to generalize well on the skilled forgeries that are not available during the training.
Araabi, Babak N. +3 more
core +1 more source
Sigref – A Symbolic Bisimulation Tool Box [PDF]
We present a uniform signature-based approach to compute the most popular bisimulations. Our approach is implemented symbolically using BDDs, which enables the handling of very large transition systems.
A. Bouajjani +30 more
core +3 more sources
Study on Time Rotation Notary Group Model Based on Threshold Signature [PDF]
With the emergence of various blockchain systems,the demand for cross-chain interaction is increasing,and the security of cross-chain bridge verification becomes more and more important.The notary schemes have simple principle and high efficiency,and are
ZANG Wenyang, LYU Jinlai
doaj +1 more source
In the paper, a new feature for describing a digital image of a handwritten signature based on the frequency distribution of the values of the local curvature of the signature contours, is proposed.
V. V. Starovoitov, U. Akhundjanov
doaj +1 more source
Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version) [PDF]
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the ...
Chevalier, Yannick, Kourjieh, Mounira
core +2 more sources

