Toward Resisting Forgery Attacks via Pseudo-Signatures (original) (raw)
Related papers
Easing PAIN with Digital Signatures
International Journal of Computer Applications, 2011
Mediated Signatures - Towards Undeniability of Digital Data in Technical and Legal Framework
Lecture Notes in Business Information Processing, 2010
A Study to Ascertain and Differentiate between Genuine and Transplanted Documents/Signatures
Journal of Forensic Research, 2015
Overview of Watermarks, Fingerprints, and Digital Signatures
2013
Biometric key generation using pseudo-signatures
2008
Global Features for the Off-Line Signature Verification Problem
2009 10th International Conference on Document Analysis and Recognition, 2009
A Novel Authentication Scheme to Increase Security for Non-Repudiation of Users
Evaluation of Code-based Signature Schemes
IACR Cryptology ePrint Archive, 2019
Robustness of Signature Verification Systems to Imitators with Increasing Skills
2009
A DSA-like digital signature protocol
Journal of Discrete Mathematical Sciences and Cryptography
The Battle Against Security Attacks
2002
A Signature Verification Framework for Digital Pen Applications
2012 10th IAPR International Workshop on Document Analysis Systems, 2012
2021
Universal re-encryption of signatures and controlling anonymous information flow
2004
SVC-onGoing: Signature Verification Competition
Pattern Recognition
Revisiting Security Relations Between Signature Schemes and their Inner Hash Functions
2007
Authenticity by tagging and typing
2004
Efficient ID-based Designated Verifier Signature
Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017
An Efficient Strong Designated Verifier Signature Scheme
Lecture Notes in Computer Science, 2004
ICDAR 2021 Competition on On-Line Signature Verification
Document Analysis and Recognition – ICDAR 2021, 2021
Forward-Secure Signatures with Optimal Signing and Verifying
Advances in Cryptology — CRYPTO 2001, 2001
Sanitizable Signatures with Strong Transparency in the Standard Model
Lecture Notes in Computer Science, 2010
Efficient Intrusion-Resilient Signatures Without Random Oracles
Lecture Notes in Computer Science, 2006
Signature verification using contextual information enhancement and dynamic programming
Analysis of Signature Wrapping Attacks and Countermeasures
2009 IEEE International Conference on Web Services, 2009
Digital signature with message recovery using self-certified public keys and its variants
Applied Mathematics and Computation, 2003
Confidential Signatures and Deterministic Signcryption
Lecture Notes in Computer Science, 2010
HANDBOOK of APPLIED CRYPTOGRAPHY
Exploiting Stability Regions for Online Signature Verification
Lecture Notes in Computer Science, 2013
Forgery attacks on "multisignature schemes for authenticating mobile code delegates
IEEE Transactions on Vehicular Technology, 2002
Off-line signature verification and forgery detection using fuzzy modeling
Prof. Olalekan Lekings Abdulrasheed Ogunjimi
Pattern Recognition, 2005
The Role of Technology In Combating Fake and Malicious Contents
Advances in Multidisciplinary and Scientific Research Journal, 2024
Authentication of Script Format Documents Using Watermarking Techniques
Emerging Informatics - Innovative Concepts and Applications, 2012
On the problem of masking special errors by signature analyzers 1
1995
Pattern Recognition, 2012