We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Path signature-based XAI-enabled network time series classification

    Classifying network time series (NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of...

    Le Sun, Yueyuan Wang, ... Feng **a in Science China Information Sciences
    Article 27 June 2024
  2. Short-term path signature for skeleton-based action recognition

    Skeleton-based action recognition (SBAR) is an important task in the field of computer vision. Learning effective action representations from...

    Hong-Bo Zhang, Hao-Tian Ren, ... Miao-Hui Zhang in Signal, Image and Video Processing
    Article 27 November 2022
  3. Path signature-based phase space reconstruction for stock trend prediction

    In the field of quantitative finance, stock price trend prediction has always been one of the concerns of people. Stock price time series is the most...

    Article 12 May 2022
  4. Registered Attribute-Based Signature

    This paper introduces the notion of registered attribute-based signature (registered ABS). Distinctly different from classical attribute-based...
    Yijian Zhang, Jun Zhao, ... Jie Chen in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  5. Hypericum: a post-quantum digital signature for standardization in Russia

    In this work we describe Hypericum: a stateless hash-based digital signature scheme proposed for standardization in Russia. Hypericum is a...

    Oleg Turchenko, Sergey Grebnev in Journal of Computer Virology and Hacking Techniques
    Article 25 May 2024
  6. Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification

    With the increasing awareness of user privacy protection and communication security, encrypted traffic has increased dramatically. Usually utilizing...

    Chengxi Jiang, Shijie Xu, ... **nchang Zhang in Cluster Computing
    Article 25 August 2022
  7. High discriminant features for writer-independent online signature verification

    The application of online signature is promising. However, its huge intra-individual variability and its extremely low inter-class distance brought...

    Jialin Long, Chunzhi **e, Zhisheng Gao in Multimedia Tools and Applications
    Article 30 March 2023
  8. Weighted Path Orders Are Semantic Path Orders

    We explore the relationship between weighted path orders and (monotonic) semantic path orders. Our findings reveal that weighted path orders can be...
    Teppei Saito, Nao Hirokawa in Frontiers of Combining Systems
    Conference paper Open access 2023
  9. Hash-based signature revisited

    The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post...

    Lingyun Li, **anhui Lu, Kunpeng Wang in Cybersecurity
    Article Open access 01 July 2022
  10. An efficient post-quantum secure dynamic EPID signature scheme using lattices

    Enhanced Privacy ID (EPID) signatures can be viewed as a direct anonymous attestation mechanism with expanded revocation capabilities. When the...

    Chinmoy Biswas, Ratna Dutta, Sumanta Sarkar in Multimedia Tools and Applications
    Article 10 July 2023
  11. Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

    In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...

    Purvi Tandel, Jitendra Nasriwala in Service Oriented Computing and Applications
    Article 14 June 2024
  12. BAHS: A Blockchain-Aided Hash-Based Signature Scheme

    Hash-based one-time signatures are becoming increasingly important as they are post-quantum safe and have been used in multi-cast communication and...
    Yalan Wang, Liqun Chen, ... Yangguang Tian in Information Security Practice and Experience
    Conference paper 2023
  13. Attention-based multiple siamese networks with primary representation guiding for offline signature verification

    In the area of biometrics and document forensics, handwritten signatures are one of the most commonly accepted symbols. Thus, financial and...

    Yu-Jie **ong, Song-Yang Cheng, ... Yu-** Zhang in International Journal on Document Analysis and Recognition (IJDAR)
    Article 09 October 2023
  14. GMR Signature

    Living reference work entry 2023
  15. Parallel implementations of post-quantum leighton-Micali signature on multiple nodes

    To defend against quantum computer attacks, the National Institute of Standards and Technology (NIST) has been exploring post-quantum cryptography...

    Yan Kang, **aoshe Dong, ... Qiang Wang in The Journal of Supercomputing
    Article 22 September 2023
  16. Impact of augmentation methods in online signature verification

    The aim of this paper is to investigate the impact of selected data augmentation techniques on the learning performance of neural networks for...

    Article Open access 11 August 2022
  17. A fully dynamic forward-secure group signature from lattice

    A forward-secure group signature (FSGS) ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the...

    Zhijian Liao, Qiong Huang, **njian Chen in Cybersecurity
    Article Open access 02 October 2022
  18. A state-of-the-art review on topology and differential geometry-based robotic path planning—part II: planning under dynamic constraints

    Path planning is an intrinsic component of autonomous robotics, be it industrial, research or consumer robotics. Such avenues experience constraints...

    Article 25 March 2024
  19. Performance evaluation of hyper-ledger fabric-based consensus mechanism on multi-robot path planning

    Path planning is one of the key issues in Robotics. Finding the optimal path in a dense environment is a very critical task. Coordination and...

    Saurabh Jain, Rajesh Doriya in Multimedia Tools and Applications
    Article 24 July 2023
  20. Quantum-Access Security of Hash-Based Signature Schemes

    In post-quantum cryptography, hash-based signature schemes are attractive choices because of the weak assumptions. Most existing hash-based signature...
    Quan Yuan, Mehdi Tibouchi, Masayuki Abe in Information Security and Privacy
    Conference paper 2023
Did you find what you were looking for? Share feedback.