2,572 resources related to Digital signatures
- Topics related to Digital signatures
- IEEE Organizations related to Digital signatures
- Conferences related to Digital signatures
- Periodicals related to Digital signatures
- Most published Xplore authors for Digital signatures
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)
IEEE CCNC 2020 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
All fields of satellite, airborne and ground remote sensing.
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
IEEE Transactions on Dependable and Secure Computing, 2012
Digital signatures are an important mechanism for ensuring data trustworthiness via source authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee can be subverted in the real world by sophisticated attacks, which can obtain cryptographically legitimate digital signatures without actually compromising the private signing key. This problem cannot be adequately addressed by a purely cryptographic approach, by the revocation mechanism ...
1996 8th European Signal Processing Conference (EUSIPCO 1996), 1996
A new approach to digital image signatures (watermarks) is proposed in this study. An image signature algorithm consists of two stages : signature casting and signature detection. In the first stage, small changes are embedded in the image which afterwards are identified in the second stage. After chosing certain pixel blocks from the image, a constraint is embedded among their ...
2008 International Conference on Computational Intelligence and Security, 2008
Based on the elliptic curve logarithm problem, a (t, n) threshold digital signature scheme was proposed in this paper. In the key generation phase, each participant¿s public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. ...
Proceedings of 1994 IEEE International Symposium on Information Theory, 1994
We consider the problem of broadcasting sensitive information to many low cost receivers when the authenticity and integrity of the received messages are the determining factors but secrecy is not important. Although several methods exist to authentify information, as a rule, they lack the asymmetry the transmission system itself exhibits. Therefore, we propose a highly non- symmetric algorithm to generate ...
Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 2002
To realize various applications for content distribution via networks, the unique content identifier (Content ID) is indispensable. It can be used for negotiating secondary content use, automatic royalty sharing, content search and exchange, and illegal use detection. In August 1999, responding to a call from Prof. Dr. Hiroshi Yasuda at Univ of Tokyo, the Content ID Forum (cIDf) was established ...
IMS 2012 Microapps - Simulating an NXP Doherty Power Amplifier with Digital Pre-Distortion
MicroApps: How Digital Markets are Driving Microwave Technology (Agilent Technologies)
IMS 2011 Microapps - Digital Radio Testing Using an RF Channel Replicator
Analog to Digital Types
APEC Speaker Highlights: Robert White, Chief Engineer, Embedded Power
Personal Digital Twins and Their Role in Epidemics Control
Analog to Digital Traits
IEEE Internet Inclusion: Advancing Solutions for Digital Inclusion Roundtable
The Josephson Effect: Josephson Digital Electronics in the Soviet Union
Q&A with Jeewika Ranaweera: IEEE Digital Reality Podcast, Episode 8
2011 IEEE Awards Alexander Graham Bell Medal - Arogyaswami J. Paulraj
IEEE Top Trends for 2012 at CES: Metadata Automatically Organizes Digital Content
Q&A with Bill Tonti: IEEE Digital Reality Podcast, Episode 6
Yamaha's Avant Grand Digital Piano Mimics Acoustic
Your Digital Clone for Games, Videos, and More
Q&A with Nicholas Napp: IEEE Digital Reality Podcast, Episode 5
Maker Faire 2008: Spectrum's Digital Clock Contest Winner
IEEE Xplore Digital Library - Prakash Bellur - Ignite: Sections Congress 2017
Q&A with Raj Tiwari: IEEE Digital Reality Podcast, Episode 3
Digital signatures are an important mechanism for ensuring data trustworthiness via source authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee can be subverted in the real world by sophisticated attacks, which can obtain cryptographically legitimate digital signatures without actually compromising the private signing key. This problem cannot be adequately addressed by a purely cryptographic approach, by the revocation mechanism of Public Key Infrastructure (PKI) because it may take a long time to detect the compromise, or by using tamper-resistant hardware because the attacker does not need to compromise the hardware. This problem will become increasingly more important and evident because of stealthy malware (or Advanced Persistent Threats). In this paper, we propose a novel solution, dubbed Assured Digital Signing (ADS), to enhancing the data trustworthiness vouched by digital signatures. In order to minimize the modifications to the Trusted Computing Base (TCB), ADS simultaneously takes advantage of trusted computing and virtualization technologies. Specifically, ADS allows a signature verifier to examine not only a signature's cryptographic validity but also its system security validity that the private signing key and the signing function are secure, despite the powerful attack that the signing application program and the general-purpose Operating System (OS) kernel are malicious. The modular design of ADS makes it application- transparent (i.e., no need to modify the application source code in order to deploy it) and almost hypervisor-independent (i.e., it can be implemented with any Type I hypervisor). To demonstrate the feasibility of ADS, we report the implementation and analysis of an Xen-based ADS system.
A new approach to digital image signatures (watermarks) is proposed in this study. An image signature algorithm consists of two stages : signature casting and signature detection. In the first stage, small changes are embedded in the image which afterwards are identified in the second stage. After chosing certain pixel blocks from the image, a constraint is embedded among their Discrete Cosine Transform (DCT) coefficients. Two different embedding rules are proposed. The first one employs a linear type constraint among the selected DCT coefficients and the second assigns circular detection regions, similar to the vector quantization techniques. The resistance of the digital signature to JPEG compression and to filtering are analyzed.
Based on the elliptic curve logarithm problem, a (t, n) threshold digital signature scheme was proposed in this paper. In the key generation phase, each participant¿s public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. This scheme provides the capability of detecting cheating and identifying the cheat that may be from the internal participants or the external attackers. At the same time, this scheme has the advantages of elliptic curve cryptography. The security of this scheme is based on the difficulty of solving the elliptic curve discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.
We consider the problem of broadcasting sensitive information to many low cost receivers when the authenticity and integrity of the received messages are the determining factors but secrecy is not important. Although several methods exist to authentify information, as a rule, they lack the asymmetry the transmission system itself exhibits. Therefore, we propose a highly non- symmetric algorithm to generate and verify digital signatures. The algorithm is based on the computation of square roots. Since valid messages have a definite structure, we address the question of choosing the factors to get around the difficulty caused by the quadratic nonresidues.<<ETX>>
To realize various applications for content distribution via networks, the unique content identifier (Content ID) is indispensable. It can be used for negotiating secondary content use, automatic royalty sharing, content search and exchange, and illegal use detection. In August 1999, responding to a call from Prof. Dr. Hiroshi Yasuda at Univ of Tokyo, the Content ID Forum (cIDf) was established in Japan and began to construct a framework for contents distribution promotion while protecting copyrights. This document overviews the cIDf specifications and its activities.
Many image authentication methods have been proposed, in recent years, to protect image authenticity and integrity, but most have ignored the dangers of counterfeit attack. In this paper, we propose a new image authentication method, using a vector projection technique, for safety and security in digital systems based on a PKI cryptographic framework. In this method, the vector projective square (VPS) pair of each block can be calculated by a vector projection technique, and we prove that an attacker cannot forge a counterfeit image with the same VPS pair as the original image. In addition to addressing counterfeit attacks, we also propose a new remedial algorithm which applying non-uniform B-spline to repair the modified image. This paper, therefore, has five goals: (1) to verify image authentication, (2) to verify the integrity of an image received, (3) to locate any parts that were illegally modified or counterfeited, (4) to provide security against counterfeit attacks and (5) to repair the illegally modified parts.
The irruption of cryptography in the world of telecommunications has meant an explosion of new services. One of the main developments that contributed to this expansion has been the technology of digital identity. The maturity of this technology and its advanced state of implementation has permitted to draw new ways of communication within the society. However, the application of these solutions in particular environments is not an easy task. In order to face these demands, it is fundamental to previously analyze the scope of application, and to carry through a study of the technical, human and organizational requirements that this kind of services needs. This project presents the experience of implementing a digital identity solution in a university environment, namely the Universitat de les Illes Balears.
In addition to robustness and fragility, security is quite an important issue in media authentication systems. This paper first examines the insecurity of several block-based authentication methods under counterfeit attacks. Then, we prove that the proposed digital signature, which is composed of structural information, is content-dependent and provides security against forgery attacks. Experimental results demonstrate the benefits of exploiting structural information in a media authentication system.
IPSec (IP security) and SSL (secure socket layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL have advantages and shortcomings. Yet no paper has been found comparing the two protocols in terms of characteristic and functionality. Our objective is to present an analysis of security and performance properties for IPSec and SSL.
The basic concept and the results of the current stage of the STORK 2.0 project are considered, which providing cross-border identification of individuals and legal entities, according to the Regulations of the European Parliament and the Council for electronic identification and trust services for electronic transactions in the internal market; the possibility of Ukraine as a member of the project is also considered.
his standard revises and enhances the VHDL language reference manual (LRM) by including a standard C language interface specification; specifications from previously separate, but related, standards IEEE Std 1164 -1993,1 IEEE Std 1076.2 -1996, and IEEE Std 1076.3-1997; and general language enhancements in the areas of design and verification of electronic systems.
This standard will define the test program set data embodied in a number of ASCII files for stimulus, response, and diagnostics of digital systems for use on digital Automatic Test Systems.
Research, compile, and consolidate information leading to the publication of a standard for exchanging DSRC information, providing for bi-directional message transmission and device control, in a manner which is compatible with but independent of the ASTM efforts to specify DSRC Layers 1 and 2. This will entail specifying the transponder resources, the transponder resource manager, the application message sets, and ...