Conferences related to Digital signatures

Back to Top

2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2020 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions.


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC)

All areas of ionizing radiation detection - detectors, signal processing, analysis of results, PET development, PET results, medical imaging using ionizing radiation


2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM)

The scope of the 2020 IEEE/ASME AIM includes the following topics: Actuators, Automotive Systems, Bioengineering, Data Storage Systems, Electronic Packaging, Fault Diagnosis, Human-Machine Interfaces, Industry Applications, Information Technology, Intelligent Systems, Machine Vision, Manufacturing, Micro-Electro-Mechanical Systems, Micro/Nano Technology, Modeling and Design, System Identification and Adaptive Control, Motion Control, Vibration and Noise Control, Neural and Fuzzy Control, Opto-Electronic Systems, Optomechatronics, Prototyping, Real-Time and Hardware-in-the-Loop Simulation, Robotics, Sensors, System Integration, Transportation Systems, Smart Materials and Structures, Energy Harvesting and other frontier fields.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


More Conferences

Periodicals related to Digital signatures

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Digital signatures

Back to Top

Xplore Articles related to Digital signatures

Back to Top

Enhancing Data Trustworthiness via Assured Digital Signing

IEEE Transactions on Dependable and Secure Computing, 2012

Digital signatures are an important mechanism for ensuring data trustworthiness via source authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee can be subverted in the real world by sophisticated attacks, which can obtain cryptographically legitimate digital signatures without actually compromising the private signing key. This problem cannot be adequately addressed by a purely cryptographic approach, by the revocation mechanism ...


Embedding parametric digital signatures in images

1996 8th European Signal Processing Conference (EUSIPCO 1996), 1996

A new approach to digital image signatures (watermarks) is proposed in this study. An image signature algorithm consists of two stages : signature casting and signature detection. In the first stage, small changes are embedded in the image which afterwards are identified in the second stage. After chosing certain pixel blocks from the image, a constraint is embedded among their ...


ECC-Based Threshold Digital Signature Scheme without a Trusted Party

2008 International Conference on Computational Intelligence and Security, 2008

Based on the elliptic curve logarithm problem, a (t, n) threshold digital signature scheme was proposed in this paper. In the key generation phase, each participant¿s public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. ...


A very fast method for verifying digital signatures

Proceedings of 1994 IEEE International Symposium on Information Theory, 1994

We consider the problem of broadcasting sensitive information to many low cost receivers when the authenticity and integrity of the received messages are the determining factors but secrecy is not important. Although several methods exist to authentify information, as a rule, they lack the asymmetry the transmission system itself exhibits. Therefore, we propose a highly non- symmetric algorithm to generate ...


Introduction of the Content ID Forum (cIDf)

Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002), 2002

To realize various applications for content distribution via networks, the unique content identifier (Content ID) is indispensable. It can be used for negotiating secondary content use, automatic royalty sharing, content search and exchange, and illegal use detection. In August 1999, responding to a call from Prof. Dr. Hiroshi Yasuda at Univ of Tokyo, the Content ID Forum (cIDf) was established ...


More Xplore Articles

Educational Resources on Digital signatures

Back to Top

IEEE-USA E-Books

  • Enhancing Data Trustworthiness via Assured Digital Signing

    Digital signatures are an important mechanism for ensuring data trustworthiness via source authenticity, integrity, and source nonrepudiation. However, their trustworthiness guarantee can be subverted in the real world by sophisticated attacks, which can obtain cryptographically legitimate digital signatures without actually compromising the private signing key. This problem cannot be adequately addressed by a purely cryptographic approach, by the revocation mechanism of Public Key Infrastructure (PKI) because it may take a long time to detect the compromise, or by using tamper-resistant hardware because the attacker does not need to compromise the hardware. This problem will become increasingly more important and evident because of stealthy malware (or Advanced Persistent Threats). In this paper, we propose a novel solution, dubbed Assured Digital Signing (ADS), to enhancing the data trustworthiness vouched by digital signatures. In order to minimize the modifications to the Trusted Computing Base (TCB), ADS simultaneously takes advantage of trusted computing and virtualization technologies. Specifically, ADS allows a signature verifier to examine not only a signature's cryptographic validity but also its system security validity that the private signing key and the signing function are secure, despite the powerful attack that the signing application program and the general-purpose Operating System (OS) kernel are malicious. The modular design of ADS makes it application- transparent (i.e., no need to modify the application source code in order to deploy it) and almost hypervisor-independent (i.e., it can be implemented with any Type I hypervisor). To demonstrate the feasibility of ADS, we report the implementation and analysis of an Xen-based ADS system.

  • Embedding parametric digital signatures in images

    A new approach to digital image signatures (watermarks) is proposed in this study. An image signature algorithm consists of two stages : signature casting and signature detection. In the first stage, small changes are embedded in the image which afterwards are identified in the second stage. After chosing certain pixel blocks from the image, a constraint is embedded among their Discrete Cosine Transform (DCT) coefficients. Two different embedding rules are proposed. The first one employs a linear type constraint among the selected DCT coefficients and the second assigns circular detection regions, similar to the vector quantization techniques. The resistance of the digital signature to JPEG compression and to filtering are analyzed.

  • ECC-Based Threshold Digital Signature Scheme without a Trusted Party

    Based on the elliptic curve logarithm problem, a (t, n) threshold digital signature scheme was proposed in this paper. In the key generation phase, each participant¿s public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. This scheme provides the capability of detecting cheating and identifying the cheat that may be from the internal participants or the external attackers. At the same time, this scheme has the advantages of elliptic curve cryptography. The security of this scheme is based on the difficulty of solving the elliptic curve discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.

  • A very fast method for verifying digital signatures

    We consider the problem of broadcasting sensitive information to many low cost receivers when the authenticity and integrity of the received messages are the determining factors but secrecy is not important. Although several methods exist to authentify information, as a rule, they lack the asymmetry the transmission system itself exhibits. Therefore, we propose a highly non- symmetric algorithm to generate and verify digital signatures. The algorithm is based on the computation of square roots. Since valid messages have a definite structure, we address the question of choosing the factors to get around the difficulty caused by the quadratic nonresidues.<<ETX>>

  • Introduction of the Content ID Forum (cIDf)

    To realize various applications for content distribution via networks, the unique content identifier (Content ID) is indispensable. It can be used for negotiating secondary content use, automatic royalty sharing, content search and exchange, and illegal use detection. In August 1999, responding to a call from Prof. Dr. Hiroshi Yasuda at Univ of Tokyo, the Content ID Forum (cIDf) was established in Japan and began to construct a framework for contents distribution promotion while protecting copyrights. This document overviews the cIDf specifications and its activities.

  • Applying projection and B-spline to image authentication and remedy

    Many image authentication methods have been proposed, in recent years, to protect image authenticity and integrity, but most have ignored the dangers of counterfeit attack. In this paper, we propose a new image authentication method, using a vector projection technique, for safety and security in digital systems based on a PKI cryptographic framework. In this method, the vector projective square (VPS) pair of each block can be calculated by a vector projection technique, and we prove that an attacker cannot forge a counterfeit image with the same VPS pair as the original image. In addition to addressing counterfeit attacks, we also propose a new remedial algorithm which applying non-uniform B-spline to repair the modified image. This paper, therefore, has five goals: (1) to verify image authentication, (2) to verify the integrity of an image received, (3) to locate any parts that were illegally modified or counterfeited, (4) to provide security against counterfeit attacks and (5) to repair the illegally modified parts.

  • Digital Signature Pilot Test for Academic Records

    The irruption of cryptography in the world of telecommunications has meant an explosion of new services. One of the main developments that contributed to this expansion has been the technology of digital identity. The maturity of this technology and its advanced state of implementation has permitted to draw new ways of communication within the society. However, the application of these solutions in particular environments is not an easy task. In order to face these demands, it is fundamental to previously analyze the scope of application, and to carry through a study of the technical, human and organizational requirements that this kind of services needs. This project presents the experience of implementing a digital identity solution in a university environment, namely the Universitat de les Illes Balears.

  • On the security of structural information extraction/embedding for images

    In addition to robustness and fragility, security is quite an important issue in media authentication systems. This paper first examines the insecurity of several block-based authentication methods under counterfeit attacks. Then, we prove that the proposed digital signature, which is composed of structural information, is content-dependent and provides security against forgery attacks. Experimental results demonstrate the benefits of exploiting structural information in a media authentication system.

  • A technical comparison of IPSec and SSL

    IPSec (IP security) and SSL (secure socket layer) have been the most robust and most potential tools available for securing communications over the Internet. Both IPSec and SSL have advantages and shortcomings. Yet no paper has been found comparing the two protocols in terms of characteristic and functionality. Our objective is to present an analysis of security and performance properties for IPSec and SSL.

  • STORK - Promising project of european transnational electronic identification

    The basic concept and the results of the current stage of the STORK 2.0 project are considered, which providing cross-border identification of individuals and legal entities, according to the Regulations of the European Parliament and the Council for electronic identification and trust services for electronic transactions in the internal market; the possibility of Ukraine as a member of the project is also considered.



Standards related to Digital signatures

Back to Top

(Replaced) IEEE Standard VHDL Language Reference Manual

his standard revises and enhances the VHDL language reference manual (LRM) by including a standard C language interface specification; specifications from previously separate, but related, standards IEEE Std 1164 -1993,1 IEEE Std 1076.2 -1996, and IEEE Std 1076.3-1997; and general language enhancements in the areas of design and verification of electronic systems.


IEEE Standard for Digital Test Interchange Format (DTIF)

This standard will define the test program set data embodied in a number of ASCII files for stimulus, response, and diagnostics of digital systems for use on digital Automatic Test Systems.


IEEE Standard for Message Sets for Vehicle/Roadside Communications

Research, compile, and consolidate information leading to the publication of a standard for exchanging DSRC information, providing for bi-directional message transmission and device control, in a manner which is compatible with but independent of the ASTM efforts to specify DSRC Layers 1 and 2. This will entail specifying the transponder resources, the transponder resource manager, the application message sets, and ...



Jobs related to Digital signatures

Back to Top