|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 411 occurrences of 256 keywords
|
|
|
Results
Found 1825 publication records. Showing 1825 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
85 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks |
75 | Lei Shi, Shenghui Su, Zhengrong Xiang |
Design of a Passport Anti-forgery System Based on Digital Signature Schemes. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Passport anti-forgery, IC chip, Client / server, Algorithm, Digital signature scheme |
64 | Shenghui Su, Yongquan Cai, Changxiang Shen |
The Banknote Anti-forgery System Based on Digital Signature Algorithms. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Anti-forgery, Preliminary design, Verification, Digital signature |
64 | Vamsi Krishna Madasu, Mohd. Hafizuddin Mohd. Yusof, Madasu Hanmandlu, Kurt Kubik |
Off-Line Signature Verification and Forgery Detection System Based on Fuzzy Modeling. |
Australian Conference on Artificial Intelligence |
2003 |
DBLP DOI BibTeX RDF |
Box-Method, Fuzzy Modeling, Signature Verification, Forgery detection |
61 | Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv |
61 | Jorge Guajardo, Bart Preneel, Pim Tuyls, Ahmad-Reza Sadeghi |
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware. |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
61 | Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls |
09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware. |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
56 | Patrick Perrot, Mathieu Morel, Joseph Razik, Gérard Chollet |
Vocal Forgery in Forensic Sciences. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
disguised voices, identification, SVM classifier, voice conversion |
56 | Y. J. Song, R. Z. Liu, T. N. Tan |
Digital Watermarking for Forgery Detection in Printed Materials. |
IEEE Pacific Rim Conference on Multimedia |
2001 |
DBLP DOI BibTeX RDF |
|
53 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
53 | Edson J. R. Justino, Flávio Bortolozzi, Robert Sabourin |
Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries. |
ICDAR |
2001 |
DBLP DOI BibTeX RDF |
|
51 | Chou Chen Yang, Ren-Chiun Wang |
An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
authentication, smart card, password, forgery attack |
51 | Flor Ramírez Rioja, Mariko Nakano-Miyatake, Héctor M. Pérez Meana, Karina Toscano |
Dynamics features Extraction for on-Line Signature verification. |
CONIELECOMP |
2004 |
DBLP DOI BibTeX RDF |
extraction of dynamics characteristics, forgery detection and off-line signature verification, Signature verification, dynamics verification |
51 | Najah Muhammad, Muhammad Hussain 0001, Ghulam Muhammad, George Bebis |
Copy-Move Forgery Detection Using Dyadic Wavelet Transform. |
CGIV |
2011 |
DBLP DOI BibTeX RDF |
Image forgery detection, non-intrusive method, copy-move forgery, denoising |
51 | Cheng-Chang Lien, Cheng-Lun Shih, Chih-Hsun Chou |
Fast Forgery Detection with the Intrinsic Resampling Properties. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
image forgery, intrinsic resampling properties, resampling, forgery detection |
48 | Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka |
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Bleichenbacher’s forgery attack, RSASSA-PKCS-v1_5, time-stamp forgery, Acrobat, Acrobat Reader |
48 | Jorge Guajardo, Bart Preneel, Ahmad-Reza Sadeghi, Pim Tuyls (eds.) |
Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009 |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
48 | Darko Kirovski |
Anti-Counterfeiting: Mixing the Physical and the Digital World. |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
48 | Boris Skoric, Marc X. Makkes |
Simplification of Controlled PUF primitives. |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
48 | Philippe Teuwen |
How to Make Smartcards Resistant to Hackers' Lightsabers? |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
48 | Patrick Schaumont |
Engineering On-Chip Thermal Effects. |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
48 | Boris Skoric, Pim Tuyls |
An efficient fuzzy extractor for limited noise. |
Foundations for Forgery-Resilient Cryptographic Hardware |
2009 |
DBLP BibTeX RDF |
|
45 | Yongdong Wu, Feng Bao 0001, Robert H. Deng |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
45 | E. S. Gopi Subbu, N. Lakshmanan, T. Gokul, S. KumaraGanesh, Prerak R. Shah |
Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Arjen K. Lenstra, Igor E. Shparlinski |
Selective Forgery of RSA Signatures with Fixed-Pattern Padding. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Karl Brincat, Chris J. Mitchell |
New CBC-MAC Forgery Attacks. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Gerrit Bleumer, Birgit Pfitzmann, Michael Waidner |
A Remark on a Signature Scheme Where Forgery Can Be Proved. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
43 | Babak Mahdian, Stanislav Saic |
Detection of Near-Duplicated Image Regions. |
Computer Recognition Systems 2 |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Ziqing Mao, Ninghui Li, Ian M. Molloy |
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Cross-Site Request Forgery, Web Security, Browser Security |
43 | Adam Barth, Collin Jackson, John C. Mitchell |
Robust defenses for cross-site request forgery. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery, http referer header, web application firewall, same-origin policy |
43 | Seung-Jin Ryu, Hae-Yeoun Lee, Il-Weon Cho, Heung-Kyu Lee |
Document Forgery Detection with SVM Classifier and Image Quality Measures. |
PCM |
2008 |
DBLP DOI BibTeX RDF |
printer identification, Digital forensics, SVM classifier, forgery detection, image quality measures |
43 | Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh |
Forgery attack on the RPC incremental unforgeable encryption scheme. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
incremental encryption, forgery attack |
40 | Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo |
An Improvement of Remote User Authentication Scheme Using Smart Cards. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack |
40 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
40 | Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo |
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack |
40 | Katsuyuki Okeya, Tetsu Iwata |
Side Channel Attacks on Message Authentication Codes. |
ESAS |
2005 |
DBLP DOI BibTeX RDF |
Selective Forgery, MACs, Side Channel Attacks, DPA, SPA |
40 | SungJun Min, Go Yamamoto, Kwangjo Kim |
Weak Property of Malleability in NTRUSign. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
NTRUSign, Strong Existential Forgery, Centered Norm, Digital Signature Scheme, Malleability |
40 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
40 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk |
RSA-Based Fail-Stop Signature Schemes. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Fail-Stop Signature Schemes, Proof of Forgery, RSA |
35 | Chih-Chung Hsu, Tzu-Yi Hung, Chia-Wen Lin, Chiou-Ting Hsu |
Video forgery detection using correlation of noise residue. |
MMSP |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Jean Hennebert, Renato Loeffel, Andreas Humm, Rolf Ingold |
A New Forgery Scenario Based on Regaining Dynamics of Signature. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Chunbo Ma, Jun Ao, Jianhua Li 0001 |
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. |
HCI (15) |
2007 |
DBLP DOI BibTeX RDF |
Chameleon, Authentication, Key Agreement, Deniability |
35 | Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama |
Analysis on Bleichenbacher's Forgery Attack. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Weiqi Luo 0001, Jiwu Huang, Guoping Qiu |
Robust Detection of Region-Duplication Forgery in Digital Image. |
ICPR (4) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Alisher Kholmatov, Berrin A. Yanikoglu |
SUSIG: an on-line signature database, associated protocols and benchmark results. |
Pattern Anal. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Database, Biometrics, On-line signature verification |
32 | Yanlin Qin, Xiaoping Wu |
Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Tran Van Lanh, Kai-Sen Chong, Sabu Emmanuel, Mohan S. Kankanhalli |
A Survey on Digital Camera Image Forensic Methods. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Tian-Tsong Ng, Shih-Fu Chang, Jessie Hsu, Lexing Xie, Mao-Pei Tsui |
Physics-motivated features for distinguishing photographic images and computer graphics. |
ACM Multimedia |
2005 |
DBLP DOI BibTeX RDF |
computer graphics, fractal, steganalysis, differential geometry, image authentication, natural image statistics, image forensics |
32 | Hikaru Morita, D. Sakamoto, Tetsu Ohishi, Yoshimitsu Komiya, Takashi Matsumoto 0001 |
On-Line Signature Verifier Incorporating Pen Position, Pen Pressure, and Pen Inclination Trajectories. |
AVBPA |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Reihaneh Safavi-Naini, Willy Susilo |
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. |
ISW |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Bin Fang 0001, Y. Y. Wang, Cheung H. Leung, Yuan Yan Tang, Paul C. K. Kwok, K. W. Tse 0001, Y. K. Wong |
A Smoothness Index based Approach for Off-line Signature Verification. |
ICDAR |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Bart Preneel, Paul C. van Oorschot |
On the Security of Two MAC Algorithms. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
32 | Jirí Grim, Petr Somol, Pavel Pudil |
Digital Image Forgery Detection by Local Statistical Models. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
local statistical models, distribution mixtures, EM algorithm, forgery detection |
32 | Jung Yeon Hwang, Dong Hoon Lee 0001, Moti Yung |
Universal forgery of the identity-based sequential aggregate signature scheme. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
sequential aggregate signature, universal forgery, identity-based cryptography |
32 | Hailing Huang, Weiqiang Guo, Yu Zhang |
Detection of Copy-Move Forgery in Digital Images Using SIFT Algorithm. |
PACIIA (2) |
2008 |
DBLP DOI BibTeX RDF |
copy-move forgery, Image processing, feature matching, keypoints |
32 | Won-Du Chang, Jungpil Shin 0001 |
DPW Approach for Random Forgery Problem in Online Handwritten Signature Verification. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
Online Signature Verification, Random Forgery Problem, Dynamic Positional Warping, Dynamic Time Warping |
29 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
29 | Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
SOMA: mutual approval for included content in web pages. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery (XSRF), javascript, web security, cross-site scripting (XSS), same origin policy |
29 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack |
29 | Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovich, Timo Kasper |
Collision Attacks on AES-Based MAC: Alpha-MAC. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Alpha-MAC, selective forgery, MAC, AES, side-channel attack, message authentication codes, collision attack |
29 | Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern |
Index Calculation Attacks on RSA Signature and Encryption. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
cryptanalsis, Index Calculation, ISO 9796, RSA, smoothness, signature, forgery |
29 | Guilin Wang |
Security Analysis of Several Group Signature Schemes. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forgery |
29 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Secure and Efficient Digital Coins. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
digital coins, electronic cash systems, complex online computations, payment phase, off-line anonymous cash scheme, payment transactions, unconditional client anonymity, double-spending detection, coin forgery, framing attacks, security, efficiency, EFTS |
26 | Litty Koshy, S. Prayla Shyry |
YOLO-FORGERY: Forgery Detection in images via Deep Clifford gradient-based YOLOv4 Network. |
Signal Image Video Process. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Decheng Liu, Zeyang Zheng, Chunlei Peng, Yukai Wang, Nannan Wang 0001, Xinbo Gao 0001 |
Hierarchical Forgery Classifier on Multi-Modality Face Forgery Clues. |
IEEE Trans. Multim. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Jiawei Liang, Siyuan Liang, Aishan Liu, Xiaojun Jia, Junhao Kuang, Xiaochun Cao |
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Jiahe Tian, Peng Chen, Cai Yu, Xiaomeng Fu, Xi Wang 0014, Jiao Dai, Jizhong Han |
Learning to Discover Forgery Cues for Face Forgery Detection. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot |
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang 0001, Xinbo Gao 0001 |
Spatial-Temporal Frequency Forgery Clue for Video Forgery Detection in VIS and NIR Scenario. |
IEEE Trans. Circuits Syst. Video Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Decheng Liu, Tao Chen, Chunlei Peng, Nannan Wang 0001, Ruimin Hu, Xinbo Gao 0001 |
Attention Consistency Refined Masked Frequency Forgery Representation for Generalizing Face Forgery Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot |
Forgery-aware Adaptive Vision Transformer for Face Forgery Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot |
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Sami Gazzah, Lamia Rzouga Haddada, Isam Shallal, Najoua Essoukri Ben Amara |
Digital Image Forgery Detection with Focus on a Copy-Move Forgery Detection: A Survey. |
CW |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Decheng Liu, Zeyang Zheng, Chunlei Peng, Yukai Wang, Nannan Wang 0001, Xinbo Gao 0001 |
Hierarchical Forgery Classifier On Multi-modality Face Forgery Clues. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Jianshu Li, Man Luo, Jian Liu, Tao Chen, Chengjie Wang, Ziwei Liu, Shuo Liu, Kewei Yang, Xuning Shao, Kang Chen, Boyuan Liu, Mingyu Guo, Ying Guo, Yingying Ao, Pengfei Gao |
Multi-Forgery Detection Challenge 2022: Push the Frontier of Unconstrained and Diverse Forgery Detection. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Yukai Wang, Chunlei Peng, Decheng Liu, Nannan Wang 0001, Xinbo Gao 0001 |
Spatial-Temporal Frequency Forgery Clue for Video Forgery Detection in VIS and NIR Scenario. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Long Zhuo, Shunquan Tan, Bin Li 0011, Jiwu Huang |
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Long Zhuo, Shunquan Tan, Bin Li 0011, Jiwu Huang |
Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
26 | Somayeh Sadeghi, Sajjad Dadkhah, Hamid Abdullah Jalab, Giuseppe Mazzola, Diaa M. Uliyan |
State of the art in passive digital image forgery detection: copy-move image forgery. |
Pattern Anal. Appl. |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Isilay Bozkurt, Mustafa Hakan Bozkurt, Güzin Ulutas |
A new video forgery detection approach based on forgery line. |
Turkish J. Electr. Eng. Comput. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Timothy K. Shih, Joseph C. Tsai, Nick C. Tang, Shih-Ming Chang, Yaurice Y. Lin |
Video Forgery and Special Effect Production. |
IVIC |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Timothy K. Shih, Joseph C. Tsai, Nick C. Tang, Shih-Ming Chang, Yaurice Y. Lin |
Video Forgery. |
FGIT |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Jin Chen 0005, Daniel P. Lopresti, Fabian Monrose |
Toward Resisting Forgery Attacks via Pseudo-Signatures. |
ICDAR |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Renaud Feil, Louis Nyffenegger |
Evolution of cross site request forgery attacks. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Yuxin Zhao, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Ming Bao |
Forgery-location highway monitoring systembased on video watermarking. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Combating digital document forgery using new secure information hiding algorithm. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim |
eMARP: Enhanced Mobile Agent for RFID Privacy Protection and Forgery Detection. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Anoop M. Namboodiri, Shailesh Saini, Xiaoguang Lu, Anil K. Jain 0001 |
Skilled Forgery Detection in On-Line Signatures: A Multimodal Approach. |
ICBA |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jinhong Katherine Guo, David S. Doermann, Azriel Rosenfeld |
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties. |
ICPR |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell |
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Message Authentication Codes, CBC-MAC |
24 | Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee |
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh |
An improvement of Xu et al.'s authentication scheme using smart cards. |
Bangalore Compute Conf. |
2010 |
DBLP DOI BibTeX RDF |
cryptography, network security, smart card, hash function, password, authentication protocol |
21 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
21 | Danjun Pu, Gregory R. Ball, Sargur N. Srihari |
A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference. |
IWCF |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Vivian L. Blankers, C. Elisa van den Heuvel, Katrin Franke, Louis Vuurpijl |
ICDAR 2009 Signature Verification Competition. |
ICDAR |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Qiming Li, Sujoy Roy |
On the security of non-forgeable robust hash functions. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jinsong Gui, Xiaoheng Deng |
An Adaptive Topology-Based Reputation Model for Unstructured P2P Networks. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Nick C. Tang, Timothy K. Shih, Hong-Yuan Mark Liao, Joseph C. Tsai, Hsing-Ying Zhong |
Motion extrapolation for video story planning. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
layer segmentation, tracking, special effect, video inpainting |
Displaying result #1 - #100 of 1825 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|