Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,251 papers from all fields of science
Search
Sign In
Create Free Account
Digital signature
Known as:
Signature (disambiguation)
, Digital signatures
, Adaptive chosen message attack
Expand
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or documents. A valid digital signature gives a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Actor model
AudioID
Authentication
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Obfuscation Techniques for Mobile Agent code confidentiality
S. Armoogum
,
Asvin Caully
2011
Corpus ID: 14573662
Mobile code, typically mobile agent applications, promises many advantages and is suitable to many different types of…
Expand
Highly Cited
2008
Highly Cited
2008
Comment on ``Arbitrated quantum-signature scheme''
M. Curty
,
N. Lutkenhaus
2008
Corpus ID: 119194266
We investigate the quantum signature scheme proposed by and Zeng and Keitel [Phys. Rev. A 65, 042312 (2002)]. It uses Greenberger…
Expand
Highly Cited
2007
Highly Cited
2007
Spectropolarimetric observations of the transiting planetary system of the K dwarf HD 189733
C. Moutou
,
J. Donati
,
+7 authors
A. Vidal-Madjar
2007
Corpus ID: 15260611
With a Jupiter-mass planet orbiting at a distance of only 0.031 AU, the active K2 dwarf HD 189733 is a potential candidate in…
Expand
Highly Cited
2007
Highly Cited
2007
DEBORA: Digital AccEss to BOoks of the RenAissance
Frank Lebourgeois
,
H. Emptoz
International Journal of Document Analysis and…
2007
Corpus ID: 39665022
EBORA (Digital AccEss to BOoks of the RenAissance) is a multidisciplinary European project aiming at digitizing and thus making…
Expand
Highly Cited
2005
Highly Cited
2005
Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers
A. Kiayias
,
M. Yung
International Conference on Cryptology in…
2005
Corpus ID: 45717445
The demonstration of an efficient construction proven secure in a formal model that captures all intuitive security properties of…
Expand
Highly Cited
2004
Highly Cited
2004
A threshold signature scheme for group communications without a shared distribution center
T. Chang
,
Chou-Chen Yang
,
M. Hwang
Future generations computer systems
2004
Corpus ID: 10334552
Highly Cited
2003
Highly Cited
2003
Designated-receiver proxy signature scheme for electronic commerce
Jia-Zhu Dai
,
Xiaohu Yang
,
Jinxiang Dong
SMC'03 Conference Proceedings. IEEE…
2003
Corpus ID: 27634498
Proxy signature is the solution to delegation of signing capabilities in electronic world. Proxy signatures are signature schemes…
Expand
Highly Cited
1999
Highly Cited
1999
Indexing techniques for wireless data broadcast under data clustering and scheduling
Qinglong Hu
,
Wang-Chien Lee
,
Lee
International Conference on Information and…
1999
Corpus ID: 11737127
This paper investigates power conserving indexing techniques for data disseminated on a broadcast channel. A <italic>hybrid…
Expand
Highly Cited
1998
Highly Cited
1998
Threshold signature schemes with traceable signers in group communications
Ching-Te Wang
,
Chu-Hsing Lin
,
Chinchen Chang
Computer Communications
1998
Corpus ID: 33317736
Review
1997
Review
1997
A Review of Dynamic Handwritten Signature Verification
G. Gupta
,
A. McCabe
1997
Corpus ID: 14199910
There is considerable interest in authentication based on handwritten signature veriication (HSV) because HSV is superior to many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE