Results 31 to 40 of about 260,218 (282)

Speeding-up verification of digital signatures

open access: yesJournal of Computer and System Sciences, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Taleb, Abdul Rahman, Vergnaud, Damien
openaire   +4 more sources

Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

open access: yesMATEC Web of Conferences, 2016
Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors.
Hussein Walid   +2 more
doaj   +1 more source

A new code‐based digital signature based on the McEliece cryptosystem

open access: yesIET Communications, 2023
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui   +2 more
doaj   +1 more source

Signature Verification Approach using Fusion of Hybrid Texture Features

open access: yes, 2019
In this paper, a writer-dependent signature verification method is proposed. Two different types of texture features, namely Wavelet and Local Quantized Patterns (LQP) features, are employed to extract two kinds of transform and statistical based ...
Alaei, Alireza   +2 more
core   +1 more source

Online Signature Verification Using Fourier Descriptors [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yanıkoğlu, Berrin, Kholmatov, Alisher
openaire   +4 more sources

Learning Representations from Persian Handwriting for Offline Signature Verification, a Deep Transfer Learning Approach

open access: yes, 2019
Offline Signature Verification (OSV) is a challenging pattern recognition task, especially when it is expected to generalize well on the skilled forgeries that are not available during the training.
Araabi, Babak N.   +3 more
core   +1 more source

Sigref – A Symbolic Bisimulation Tool Box [PDF]

open access: yes, 2006
We present a uniform signature-based approach to compute the most popular bisimulations. Our approach is implemented symbolically using BDDs, which enables the handling of very large transition systems.
A. Bouajjani   +30 more
core   +3 more sources

Study on Time Rotation Notary Group Model Based on Threshold Signature [PDF]

open access: yesJisuanji kexue
With the emergence of various blockchain systems,the demand for cross-chain interaction is increasing,and the security of cross-chain bridge verification becomes more and more important.The notary schemes have simple principle and high efficiency,and are
ZANG Wenyang, LYU Jinlai
doaj   +1 more source

Distribution of local curvature values as a structural feature for off-line handwritten signature verification

open access: yesСистемный анализ и прикладная информатика, 2023
In the paper, a new feature for describing a digital image of a handwritten signature based on the frequency distribution of the values of the local curvature of the signature contours, is proposed.
V. V. Starovoitov, U. Akhundjanov
doaj   +1 more source

Key Substitution in the Symbolic Analysis of Cryptographic Protocols (extended version) [PDF]

open access: yes, 2007
Key substitution vulnerable signature schemes are signature schemes that permit an intruder, given a public verification key and a signed message, to compute a pair of signature and verification keys such that the message appears to be signed with the ...
Chevalier, Yannick, Kourjieh, Mounira
core   +2 more sources

Home - About - Disclaimer - Privacy