Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,495,941 papers from all fields of science
Search
Sign In
Create Free Account
Signature program
A signature program is a small, highly condensed piece of code (commonly written in C or C++), usually three or fewer lines in length which when…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
ASCII art
C++
Compiler
Computer graphics
Expand
Broader (1)
Computer programming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Le rôle des nouvelles technologies dans le travail et la construction identitaire des journalistes politiques de la presse écrite
Catherine Mathys
2013
Corpus ID: 142627567
2010
2010
A hybrid online signature verification system supporting multi-confidential levels defined by data mining techniques
J. Moon
,
Sung-Gyu Lee
,
S. Cho
,
Yoo-Sung Kim
International Journal of Intelligent Systems…
2010
Corpus ID: 46320458
Online signature verification is used widely for user authentication in many applications. In existing systems, one confidential…
Expand
2007
2007
Dux reget examen (Epistle 1.19-23): Horace's Archilochean Signature
J. Katz
2007
Corpus ID: 188938516
2006
2006
A new version of ElGamal signature scheme
E. S. Ismail
,
Y. Hasan
2006
Corpus ID: 16539385
In the original ElGamal signature scheme and it’s variants, two secret integers-private key and one-time secret key are required…
Expand
2004
2004
Reduction of Feature Statistics Estimation Error for Small Training Sample Size in Off-Line Signature Verification
Bin Fang
,
Y. Tang
International Conference on Biometric…
2004
Corpus ID: 105624
In this paper, we propose two methods to tackle the sparse data problem in off-line signature verification. The first one is to…
Expand
2003
2003
Hierarchical Bitmap Index: An Efficient and Scalable Indexing Technique for Set-Valued Attributes
Mikolaj Morzy
,
T. Morzy
,
A. Nanopoulos
,
Y. Manolopoulos
Symposium on Advances in Databases and…
2003
Corpus ID: 8925483
Set-valued attributes are convenient to model complex objects occurring in the real world. Currently available database systems…
Expand
Highly Cited
2001
Highly Cited
2001
Authenticated key agreement without using one-way hash functions
L. Harn
,
H.-Y. Lin
2001
Corpus ID: 109851235
The MQV key agreement protocol has been adopted by the IEEE P1363 Committee to become a standard. The MQV protocol used a digital…
Expand
2000
2000
A BIST scheme for RTL circuits based on symbolic testabilityanalysis
Indradeep Ghosh
,
N. Jha
,
S. Bhawmik
IEEE Trans. Comput. Aided Des. Integr. Circuits…
2000
Corpus ID: 39888373
This paper introduces a novel scheme for testing register-transfer level (RTL) controller/data paths using built-in self-test…
Expand
1998
1998
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group
Y. Desmedt
,
B. King
,
W. Kishimoto
,
K. Kurosawa
Australasian Conference on Information Security…
1998
Corpus ID: 5141866
In this paper, we show an efficient (k,n) threshold secret sharing scheme over any finite Abelian group such that the size of…
Expand
1993
1993
The partitioning of linear registers for testing applications
E. Kontopidi
,
J. Muzio
1993
Corpus ID: 60884800
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE