Toward Resisting Forgery Attacks via Pseudo-Signatures (original) (raw)

Easing PAIN with Digital Signatures

M Tariq Banday

International Journal of Computer Applications, 2011

View PDFchevron_right

Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework

Anna Lauks-Dutka

Lecture Notes in Business Information Processing, 2010

View PDFchevron_right

A Study to Ascertain and Differentiate between Genuine and Transplanted Documents/Signatures

Manisha Mann

Journal of Forensic Research, 2015

View PDFchevron_right

Overview of Watermarks, Fingerprints, and Digital Signatures

SONALI SATONKAR

2013

View PDFchevron_right

Biometric key generation using pseudo-signatures

Daniel Lopresti

2008

View PDFchevron_right

Global Features for the Off-Line Signature Verification Problem

Mai Nguyễn

2009 10th International Conference on Document Analysis and Recognition, 2009

View PDFchevron_right

A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users

Nor Fazlida Mohd Sani

View PDFchevron_right

Evaluation of Code-based Signature Schemes

Shinsaku Kiyomoto

IACR Cryptology ePrint Archive, 2019

View PDFchevron_right

Robustness of Signature Verification Systems to Imitators with Increasing Skills

Fernando Alonso-Fernandez

2009

View PDFchevron_right

A DSA-like digital signature protocol

Leila Zahhafi

Journal of Discrete Mathematical Sciences and Cryptography

View PDFchevron_right

The Battle Against Security Attacks

Katina Michael

2002

View PDFchevron_right

A Signature Verification Framework for Digital Pen Applications

Sheraz Ahmed

2012 10th IAPR International Workshop on Document Analysis Systems, 2012

View PDFchevron_right

Signatures

A.D.J. Rajani

2021

View PDFchevron_right

Universal re-encryption of signatures and controlling anonymous information flow

Anna Lauks-Dutka

2004

View PDFchevron_right

SVC-onGoing: Signature Verification Competition

Sarthak Mishra

Pattern Recognition

View PDFchevron_right

Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions

Pierre-alain Fouque

2007

View PDFchevron_right

Authenticity by tagging and typing

Michele Bugliesi

2004

View PDFchevron_right

Efficient ID-based Designated Verifier Signature

Amandine Jambert

Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017

View PDFchevron_right

An Efficient Strong Designated Verifier Signature Scheme

Olivier Markowitch

Lecture Notes in Computer Science, 2004

View PDFchevron_right

ICDAR 2021 Competition on On-Line Signature Verification

felix ahumada

Document Analysis and Recognition – ICDAR 2021, 2021

View PDFchevron_right

Forward-Secure Signatures with Optimal Signing and Verifying

Gene Itkis

Advances in Cryptology — CRYPTO 2001, 2001

View PDFchevron_right

Sanitizable Signatures with Strong Transparency in the Standard Model

Shivank Agrawal

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Efficient Intrusion-Resilient Signatures Without Random Oracles

Jean-jacques Quisquater

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Signature verification using contextual information enhancement and dynamic programming

Khalid Saeed

View PDFchevron_right

Analysis of Signature Wrapping Attacks and Countermeasures

Sebastian Gajek

2009 IEEE International Conference on Web Services, 2009

View PDFchevron_right

Digital signature with message recovery using self-certified public keys and its variants

HungYu Chien

Applied Mathematics and Computation, 2003

View PDFchevron_right

Confidential Signatures and Deterministic Signcryption

Mark Manulis, Marc Fischlin

Lecture Notes in Computer Science, 2010

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Exploiting Stability Regions for Online Signature Verification

Angelo Marcelli

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Forgery attacks on "multisignature schemes for authenticating mobile code delegates

HungYu Chien

IEEE Transactions on Vehicular Technology, 2002

View PDFchevron_right

Off-line signature verification and forgery detection using fuzzy modeling

Prof. Olalekan Lekings Abdulrasheed Ogunjimi

Pattern Recognition, 2005

View PDFchevron_right

The Role of Technology In Combating Fake and Malicious Contents

Oladele Omoyeni

Advances in Multidisciplinary and Scientific Research Journal, 2024

View PDFchevron_right

Authentication of Script Format Documents Using Watermarking Techniques

Mariko Nakano

Emerging Informatics - Innovative Concepts and Applications, 2012

View PDFchevron_right

On the problem of masking special errors by signature analyzers 1

Lutz Voelkel

1995

View PDFchevron_right

BioSecure signature evaluation campaign (BSEC'2009): Evaluating online signature algorithms depending on the quality of signatures

Sonia Garcia-salicetti

Pattern Recognition, 2012

View PDFchevron_right