Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Signing")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 33265

  • Page / 1331
Export

Selection :

  • and

Compositional analysis of contract-signing protocolsBACKES, Michael; DATTA, Anupam; DEREK, Ante et al.Theoretical computer science. 2006, Vol 367, Num 1-2, pp 33-56, issn 0304-3975, 24 p.Conference Paper

Which new RSA-signatures can be computed from certain given RSA-signatures?EVERTSE, J.-H; VAN HEYST, E.Journal of cryptology. 1992, Vol 5, Num 1, pp 41-52, issn 0933-2790Conference Paper

Automatic signature verification using a three-axis force-sensitive penCRANE, H. D; OSTREM, J. S.IEEE transactions on systems, man, and cybernetics. 1983, Vol 13, Num 3, pp 329-337, issn 0018-9472Article

A System for Signature Verification Based on Horizontal and Vertical Components in Hand GesturesOH, Beom-Seok; JEHYOUNG JEON; TOH, Kar-Ann et al.IEEE intelligent systems. 2013, Vol 28, Num 6, pp 52-55, issn 1541-1672, 4 p.Article

DSA type secure interactive batch verification protocolsHARN, L.Electronics Letters. 1995, Vol 31, Num 4, pp 257-258, issn 0013-5194Article

Imaging radar polarization signatures: theory and observationVAN ZYL, J. J; ZEBKER, H. A; ELACHI, C et al.Radio science. 1987, Vol 22, Num 4, pp 529-543, issn 0048-6604Article

A public key cryptosystem and a signature scheme based on discrete logarithmsTAHER ELGAMAL.IEEE transactions on information theory. 1985, Vol 31, Num 4, pp 469-472, issn 0018-9448Article

Weakness in quaternion signaturesCOPPERSMITH, D.Lecture notes in computer science. 1999, pp 305-314, issn 0302-9743, isbn 3-540-66347-9Conference Paper

An interactive identification scheme based on discrete logarithms and factoringBRICKELL, E. F; MCCURLEY, K. S.Journal of cryptology. 1992, Vol 5, Num 1, pp 29-39, issn 0933-2790Conference Paper

SINGLE DOPPLER RADAR VORTEX RECOGNITION: II. TORNADIC VORTEX SIGNATURES.BROWN RA; LEMON LR.sdIN: CONF. RADAR METEOROL. 17; SEATTLE, WASH.; 1976; BOSTON; AM. METEOROL. SOC.; DA. S.D.; PP. 104-109; BIBL. 18 REF.Conference Paper

Digital signature with (t,n) shared verification based on discrete logarithmsLEE, W.-B; CHANG, C.-C; HARN, L et al.Electronics Letters. 1995, Vol 31, Num 3, pp 176-177, issn 0013-5194Article

Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications : Information and Communication System SecurityYOUN, Taek-Young; PARK, Young-Ho; KWON, Taekyoung et al.IEICE transactions on information and systems. 2008, Vol 91, Num 5, pp 1481-1484, issn 0916-8532, 4 p.Article

Authentification et signature électronique des documents = Authentication and electronic signature of documentsBAMFORTH, P.Forum sur la gestion de documents électroniques. 1998, 10 p.Conference Paper

Design of generalized ElGamal type digital signature schemes based on discrete logarithmHARN, L; XU, Y.Electronics Letters. 1994, Vol 30, Num 24, pp 2025-2026, issn 0013-5194Article

Ein quasilinearer Signaturanalysator = Un analyseur quasilinéaire de signature = A quasilinear signature analyserMULLER, B; STIEFEL, B.Nachrichtentechnik. Elektronik. 1984, Vol 34, Num 5, pp 192-193, issn 0323-4657Article

Some fundamental algebraic tools for the semantic of computationGOGUEN, J. A; BURSTALL, R. M.Theoretical computer science. 1984, Vol 31, Num 3, pp 263-295, issn 0304-3975Article

Digital signature with (t, n) shared verification based on discrete logarithmsHORSTER, P; MICHELS, M; PETERSEN, H et al.Electronics Letters. 1995, Vol 31, Num 14, issn 0013-5194, p. 1137Article

Key-spoofing attacks on nested signature blocksCHRISTIANSON, B; LOW, M. R.Electronics Letters. 1995, Vol 31, Num 13, pp 1043-1044, issn 0013-5194Article

The signature of a plane curveO'ROURKE, J.SIAM journal on computing (Print). 1986, Vol 15, Num 1, pp 34-51, issn 0097-5397Article

Feature, attribute, and classification aided target trackingDRUMMOND, Oliver E.SPIE proceedings series. 2001, pp 542-558, isbn 0-8194-4187-2Conference Paper

Design of time-stamped proxy signatures with traceable receiversSUN, H.-M.IEE proceedings. Computers and digital techniques. 2000, Vol 147, Num 6, pp 462-466, issn 1350-2387Article

FORMALISATION DE LA THÉORIE DE RÉÉCRITURE DANS COQ = FORMALISATION OF REWRINTING THEORY IN COQ SYSTEMChabane, Nacira; Hardin, Thérèse.1999, 144 p.Thesis

Automating the handling and verification of signatures scanned from documentsLEWCOCK, A; HESKETH, G.Recognition technology. Meeting. 1996, pp 45-53Conference Paper

Weaknesses in some recent key agreement protocolsNYBERG, K; RUEPPEL, R. A.Electronics Letters. 1994, Vol 30, Num 1, pp 26-27, issn 0013-5194Article

Comments on space-time signatureCOLL, B; MORALES, J. A.Journal of mathematical physics. 1993, Vol 34, Num 6, pp 2468-2474, issn 0022-2488Article

  • Page / 1331