Digital Signatures Research Papers - Academia.edu (original) (raw)
Remote sensing is collecting information about an object without any direct physical contact with the particular object. It is widely used in many fields such as oceanography, geology, ecology. Remote sensing uses the Satellite to detect... more
Remote sensing is collecting information about an object without any direct physical contact with the
particular object. It is widely used in many fields such as oceanography, geology, ecology. Remote sensing
uses the Satellite to detect and classify the particular object or area. They also classify the object on the
earth surfaces which includes Vegetation, Building, Soil, Forest and Water. The approach uses the
classifiers of previous images to decrease the required number of training samples for the classifier
training of an incoming image. For each incoming image, a rough classifier is predicted first based on the
temporal trend of a set of previous classifiers. The predicted classifier is then fine-tuned into a more
accurate manner with current training samples. This approach can be further applied as sequential image
data, with only a small number of training samples, which are being required from each image. This
method uses LANSAT 8 images for Training and Testing processes. First, using the Classifier Prediction
technique the Signatures are being generated for the input images. The generated Signatures are used for
the Training purposes. SVM Classification is used for classifying the images. The final results describes
that the leverage of a priori information from previous images will provide advantageous improvement for
future images in multi temporal image classification.
— Today’s growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and... more
— Today’s growing number of security threats to computers and networks also increase the importance of log inspections to support the detection of possible breaches. The investigation and assessment of security incidents becomes more and more a dai-ly business. Further, the manual log analysis is essentially in the context of developing signatures for intrusion detection systems (IDS), which allow for an automated defense against security attacks or incidents. But the analysis of log data in the context of fo-rensic investigations and IDS signature development is a tedious and time-consuming task, due to the large amount of textual data. Moreover, this task requires a skilled knowledge to differentiate between the important and the non-relevant information. In this paper, we propose an approach for log resp. audit data representation, which aims at simplifying the analysis process for the secu-rity officer. For this purpose audit data and existing relations between audit events are ...
In this paper we discuss a new architecture to reduce unsolicited e-mail messages. We propose a system architecture that introduces two classes of messages-trusted e-mail and e-mail from untrusted sources. Trusted e-mail messages are... more
In this paper we discuss a new architecture to reduce unsolicited e-mail messages. We propose a system architecture that introduces two classes of messages-trusted e-mail and e-mail from untrusted sources. Trusted e-mail messages are signed with an S/MIME signature. To address usability problems that occurred previously with S/MIME signatures, outgoing e-mail messages are automatically signed on the e-mail server without
Sumario: I. Dos conceptos de «documento» en el derecho privado europeo de la moderna sociedad de la información.-II. El documento electrónico en el llamado Reglamento eIDAS (Reglamento (UE) n.º 910/2014): el problema de los límites de la... more
Sumario: I. Dos conceptos de «documento» en el derecho privado europeo de la moderna sociedad de la información.-II. El documento electrónico en el llamado Reglamento eIDAS (Reglamento (UE) n.º 910/2014): el problema de los límites de la forma electrónica como escritura.-III. La relevancia sustancial y probatoria de los documentos sin firma en el derecho italiano vigente.-IV. (sigue) Crítica.-V. Escritos y reproducciones mecánicas.-VI. La valoración ex art. 116 del Codice di procedura civile de los documentos sin firma.-VII. El régimen de los documentos informáticos sin firma y de las reproducciones informáticas.-VIII. Los nuevos documentos en derecho de consumo.-IX. El impacto de los nuevos documentos europeos en el Derecho italiano.-X. Conclusiones. Resumen: A la luz de las nuevas escrituras informáticas de la sociedad de la información y a partir de los dos conceptos diferentes de escritura que se encuentran en la Ley de Interpretación de 1978 del Reino Unido y en el art. 1.11 de los Principios Unidroit, así como de la contraposición del derecho italiano entre «scritture» (escritos) y «riproduzioni meccaniche» (reproducciones mecánicas), el trabajo investiga si la representación o reproducción de palabras en forma visible es necesaria para cumplir con los requisitos del derecho privado europeo en cuanto a la forma y la prueba por escrito, o si es suficiente cualquier forma de comunicación que preserve la documentación de la información contenida y sea reproducible en forma tangible. Argumentando la preferencia por la segunda solución, se establece una distinción entre, por un lado, «documentos declarativos» (es decir, los que constituyen el medio para efectuar declaraciones por escrito) y, por el otro, «documento meramente representativos» (que en cambio no constituyen el medio para efectuar dichas declaraciones), teniendo en cuenta varias normativas vigentes a distinto nivel en el panorama del derecho europeo (y, en particular, ciertas normas del Codice civile, del BGB y del ABGB, del Código Civil español, del Código Civil griego y de la Law of Property inglés, por un lado, y el art. 1, 4.º apartado, lett. a
The Secure Hash Algorithm is one of the most commonly used hashing algorithms on the time being. Experts are proposing for much secured SHA-1 because of some reports and study conducted on SHA-1 collision attacks. The aim of the enhanced... more
The Secure Hash Algorithm is one of the most
commonly used hashing algorithms on the time
being. Experts are proposing for much secured
SHA-1 because of some reports and study
conducted on SHA-1 collision attacks. The aim of
the enhanced Secure Hash Algorithm -1 (SHA-1) is
to strengthen its original version that is expected to
resist possible SHA-1 collision attacks. The
enhanced SHA-1 had integrated the following
modification: 1) Enhancement on the preprocessing, specifically on the parsing method. 2)
The message digest and the final message digest
formula was enhanced by giving additional shifting,
xoring and improved mathematical formula. The
enhanced SHA-1 maintains its original rounds
which consist of 80 rounds and message digest
output of 160 bit. Based from the result, the
enhanced algorithm specifically on mathematical
calculation of parsing method and message digest
had shown great effects on its result on the hash
value despite of a very minimal time delay, the
enhanced algorithm is better and more secure.
Page 1. Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-Cast Messenger Application Don Jomar S. Hombrebueno Ma. Gracia Corazon E. Sicat Jasmin D. Niguidula Enrico... more
Page 1. Symmetric Cryptosystem Based on Data Encryption Standard Integrating HMAC and Digital Signature Scheme Implemented in Multi-Cast Messenger Application Don Jomar S. Hombrebueno Ma. Gracia Corazon E. Sicat Jasmin D. Niguidula Enrico P. Chavez ...
- by Mercedes Rivolta and +1
- •
- Marketing, Public Administration, Privacy, Manufacturing
In a PDF file we can create a digital signature to give our identity and show that the document is approved electronically. If a document is digitally signed, a sender cannot say that he did not sign on it ,and also it specifies that the... more
In a PDF file we can create a digital signature to give our identity and show that the document is approved electronically. If a document is digitally signed, a sender cannot say that he did not sign on it ,and also it specifies that the file has not been modified in the transmission. In this paper we are showing how to create digitally signed PDF documents by using iTextsharp library. In addition, we can give an option whether to make the signature visible or not.
ABSTRACT Intrusion Prevention Systems (IPS) is the most important solution for providing a high level of security all over the networks today. IPS is evolving recently in a way that is expected eventually to replace other security... more
ABSTRACT Intrusion Prevention Systems (IPS) is the most important solution for providing a high level of security all over the networks today. IPS is evolving recently in a way that is expected eventually to replace other security solutions such as firewalls and anti-viruses. To over come the static signature detecting mechanism to identify intruders that exists in all host based IPSs which in turn needs to be updated from time to time to insure the most accurate detection. In this paper we introduce a four tier host based IPS that uses data mining technique, namely decision tree, as a detecting mechanism. The input parameters for the prior decision tree algorithm are the most infected or targeted computer resources by intruders, instead of a static signature database. Three test scenarios were performed to investigate the ability of the proposed IPS to classify intruders correctly.
A digital signature is a method that serves to improve the integrity, authenticity, non-repudiation, and confidentiality of digital data in transmission. This paper discusses digital signature and encryption functions for data... more
A digital signature is a method that serves to improve the integrity, authenticity, non-repudiation, and confidentiality of digital data in transmission. This paper discusses digital signature and encryption functions for data communication. In this study, implementing the data transmission is done by email using digital signatures and encryption functionality on Open PGP. In the end, this research resulted that the function of the digital signature and encryption can be implemented effectively in the process of sending data/ information via email.
13th International Conference on Communications Security & Information Assurance (CSIA 2022) focuses on all technical and practical aspects of communications security & information assurance for wired and wireless networks. The goal of... more
13th International Conference on Communications Security & Information Assurance (CSIA 2022) focuses on all technical and practical aspects of communications security & information assurance for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Security concern has become the biggest obstacle to adoption of cloud because all information and data are completely under the control of cloud service providers. To provide optimal services on cloud, this paper introduces a new... more
Security concern has become the biggest obstacle to adoption of cloud because all information and data are completely under the control of cloud service providers. To provide optimal services on cloud, this paper introduces a new distributed and scalable data sharing scheme for data owners in clouds that supports anonymous authentication. Proposed ASP (Advanced Security Protocol) protocol is a cryptographic access control protocol based on key-updating scheme referred to as Advanced Key Update (AKU). The main advantage of the AKU scheme its support for efficient delegation and revocation of privileges in hierarchies without requiring complex cryptographic data structures. Proposed ASP protocol also includes a new digital signature scheme that enables cloud providers to ensure that requests are submitted by authorized end-users, without learning their identities. User Revocation facility is also supported by proposed ASP. In this paper various existing approaches and issues related to data encryption and message authentications are also discussed. At last, experiment results are analyzed and performances are evaluated. The main aim of the paper is to provide more visibility and control to the end-users and close the gap between capabilities of existing solutions and new requirements of cloud-based systems.
In this research, we present a new method, termed F-Sign, for automatic extraction of unique signatures from malware files. F-Sign is primarily intended for high-speed network traffic filtering devices that are based on deep-packet... more
In this research, we present a new method, termed F-Sign, for automatic extraction of unique signatures from malware files. F-Sign is primarily intended for high-speed network traffic filtering devices that are based on deep-packet inspection. Malicious executables are analyzed using two approaches: disassembly, utilizing IDA-Pro, and the application of a dedicated state machine in order to obtain the set of functions comprising the executables. The signature extraction process is based on a comparison with a common function repository. By eliminating functions appearing in the common function repository from the signature candidate list, F-Sign can minimize the risk of false-positive detection errors. To minimize false-positive rates even further, F-Sign proposes intelligent candidate selection using an entropy score to generate signatures. Evaluation of F-Sign was conducted under various conditions. The findings suggest that the proposed method can be used for automatically generating signatures that are both specific and sensitive.
- by c m
- •
- Privacy, Security, Digital Signature, Cryptography
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it reduces the quantity of data to be transmitted over the complex network. In earlier studies authors used homomorphic encryption properties for... more
Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it reduces the quantity of data to be transmitted over the complex network. In earlier studies authors used homomorphic encryption properties for concealing statement during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not applicable for multi applications which lead to proposal of Concealed Data Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it provides secure counting ability. In wireless sensor networks SN are unarmed and are susceptible to attacks. Considering the defence aspect of wireless environment we have used DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for augmentation of security and throughput. To prove our proposed scheme's robustness and effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending.
2. Transactions We define an electronic coin as a chain of digital signatures. Each owner transfers the coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the... more
2. Transactions We define an electronic coin as a chain of digital signatures. Each owner transfers the coin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin. A payee can verify the signatures to verify the chain of owners.
In a document add visible signature lines to capture one or more digital signatures. Add an invisible digital signature to a document. The 2007 Microsoft Office system introduces the ability to insert a signature line into a document. You... more
In a document add visible signature lines to capture one or more digital signatures. Add an invisible digital signature to a document. The 2007 Microsoft Office system introduces the ability to insert a signature line into a document. You can insert signatures lines only into Word documents and Excel workbooks. Law Firms Confirmation letters and documents can be digitally signed allowing law firms legal consent from their clients without them ever being in the same room. This paper is to propose a kind of digital signature which is used in office data.
Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the deployment of biometric-based authentication systems. In... more
Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the deployment of biometric-based authentication systems. In this paper, we propose an approach, which we refer to as BioConvolving, that is able to guarantee security and renewability to biometric templates. Specifically, we introduce a set of noninvertible transformations, which can be applied to any biometrics whose template can be represented by a set of sequences, in order to generate multiple transformed versions of the template. Once the transformation is performed, retrieving the original data from the transformed template is computationally as hard as random guessing. As a proof of concept, the proposed approach is applied to an on-line signature recognition system, where a hidden Markov model-based matching strategy is employed. The performance of a protected on-line signature recognition system employing the proposed BioConvolving approach is evaluated, both in terms of authentication rates and renewability capacity, using the MCYT signature database. The reported extensive set of experiments shows that protected and renewable biometric templates can be properly generated and used for recognition, at the expense of a slight degradation in authentication performance.
The authors conduct structural and functional analysis of four implemented digital archival systems and a reference one followed by their comparative analysis. They analyse digital archive implementations in The Federal Chamber of... more
The authors conduct structural and functional analysis of four implemented digital archival systems and a reference one followed by their comparative analysis. They analyse digital archive implementations in The Federal Chamber of Architects and Engineers – BAIK (Austria), The Agency for Medicinal Products and Medical Devices – HALMED (Croatia), The Braunschweig Clinic (Germany), and Lithuanian Office of the Chief Archivist – Electronic Archive Information System – EAIS (Lithuania). A reference digital archive system is made by the Federal Office for Information Security – BSI (Germany). The digital archival systems are responsible for preservation of digitised or digital records in the land register (BAIK), classified records on medicines and medical devices granted to the market (HALMED), time-stamped electronic health records (Braunschweig), records of the public administration created as part of governmental e-services and signed by advanced electronic signatures (EAIS), and it should ideally be responsible for electronically signed records (BSI) as well. After the structural and functional analysis of each system, they are comparatively analysed according to the criteria grouped around functionalities and system processes, implemented standards and formats and available software tools for management of preserved records. The authors give conclusion on the issues regarding long term preservation of electronic records having additional preservation requirements due to the time-stamping, addition of (advanced) electronic signatures, and (qualified) certificates in the situations when it is necessary to ensure their authenticity, integrity and non-repudiation.
With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information.... more
With the innovations and development in sophisticated video editing technology and a wide spread of video information and services in our society, it is becoming increasingly significant to assure the trustworthiness of video information. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them. Such malicious alterations could affect the decisions based on these videos. A lot of techniques are proposed by various researchers in the literature that assure the authenticity of video information in their own way. In this paper we present a brief survey on video authentication techniques with their classification. These authentication techniques are broadly
classified into four categories: digital signature based techniques, watermark based techniques, intelligent
techniques and other techniques. Furthermore we give the shortcomings of different categories of video authentication techniques in brief.