Search
Search Results
-
Path signature-based XAI-enabled network time series classification
Classifying network time series (NTS) is crucial for automating network administration and ensuring cyberspace security. It enables the detection of...
-
Short-term path signature for skeleton-based action recognition
Skeleton-based action recognition (SBAR) is an important task in the field of computer vision. Learning effective action representations from...
-
Path signature-based phase space reconstruction for stock trend prediction
In the field of quantitative finance, stock price trend prediction has always been one of the concerns of people. Stock price time series is the most...
-
Registered Attribute-Based Signature
This paper introduces the notion of registered attribute-based signature (registered ABS). Distinctly different from classical attribute-based... -
Hypericum: a post-quantum digital signature for standardization in Russia
In this work we describe Hypericum: a stateless hash-based digital signature scheme proposed for standardization in Russia. Hypericum is a...
-
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification
With the increasing awareness of user privacy protection and communication security, encrypted traffic has increased dramatically. Usually utilizing...
-
High discriminant features for writer-independent online signature verification
The application of online signature is promising. However, its huge intra-individual variability and its extremely low inter-class distance brought...
-
Weighted Path Orders Are Semantic Path Orders
We explore the relationship between weighted path orders and (monotonic) semantic path orders. Our findings reveal that weighted path orders can be... -
Hash-based signature revisited
The current development toward quantum attack has shocked our confidence on classical digital signature schemes. As one of the mainstreams of post...
-
An efficient post-quantum secure dynamic EPID signature scheme using lattices
Enhanced Privacy ID (EPID) signatures can be viewed as a direct anonymous attestation mechanism with expanded revocation capabilities. When the...
-
Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme
In today’s era, numerous applications are evolving into smart applications by leveraging technologies like the Internet of Things (IoT), Artificial...
-
BAHS: A Blockchain-Aided Hash-Based Signature Scheme
Hash-based one-time signatures are becoming increasingly important as they are post-quantum safe and have been used in multi-cast communication and... -
Attention-based multiple siamese networks with primary representation guiding for offline signature verification
In the area of biometrics and document forensics, handwritten signatures are one of the most commonly accepted symbols. Thus, financial and...
-
-
Parallel implementations of post-quantum leighton-Micali signature on multiple nodes
To defend against quantum computer attacks, the National Institute of Standards and Technology (NIST) has been exploring post-quantum cryptography...
-
Impact of augmentation methods in online signature verification
The aim of this paper is to investigate the impact of selected data augmentation techniques on the learning performance of neural networks for...
-
A fully dynamic forward-secure group signature from lattice
A forward-secure group signature (FSGS) ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the...
-
A state-of-the-art review on topology and differential geometry-based robotic path planning—part II: planning under dynamic constraints
Path planning is an intrinsic component of autonomous robotics, be it industrial, research or consumer robotics. Such avenues experience constraints...
-
Performance evaluation of hyper-ledger fabric-based consensus mechanism on multi-robot path planning
Path planning is one of the key issues in Robotics. Finding the optimal path in a dense environment is a very critical task. Coordination and...
-
Quantum-Access Security of Hash-Based Signature Schemes
In post-quantum cryptography, hash-based signature schemes are attractive choices because of the weak assumptions. Most existing hash-based signature...