Spam detection on twitter using traditional classifiers
M Mccord, M Chuah - Autonomic and Trusted Computing: 8th International …, 2011 - Springer
Social networking sites have become very popular in recent years. Users use them to find
new friends, updates their existing friends with their latest thoughts and activities. Among …
new friends, updates their existing friends with their latest thoughts and activities. Among …
SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs
In this paper, we propose a secure incentive scheme to achieve fair and reliable cooperative
(SIRC) downloading in highway vehicular ad hoc networks (VANETs). SIRC can stimulate …
(SIRC) downloading in highway vehicular ad hoc networks (VANETs). SIRC can stimulate …
Post-quantum asynchronous deniable key exchange and the signal handshake
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
Designated verifier signature schemes: Attacks, new security notions and a new construction
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map
Abstract The concept of Designated Verifier Signatures (DVS) was introduced by Jakobsson,
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …
Identity-based strong designated verifier signature schemes
In this paper, we propose an identity based strong designated verifier signature scheme.
Firstly, we provide a generic construction of such schemes. We show that the generic …
Firstly, we provide a generic construction of such schemes. We show that the generic …
Generalized digital certificate for user authentication and key establishment for secure communications
Public-key digital certificate has been widely used in public-key infrastructure (PKI) to
provide user public key authentication. However, the public-key digital certificate itself …
provide user public key authentication. However, the public-key digital certificate itself …
Quantum public-key designated verifier signature
X **n, L Ding, C Li, Y Sang, Q Yang, F Li - Quantum Information …, 2022 - Springer
Based on the single-qubit rotations, a quantum public-key designated verifier signature
(DVS) is proposed. In this scheme, a rotation vector is employed as the signatory's secret …
(DVS) is proposed. In this scheme, a rotation vector is employed as the signatory's secret …
Deriving use cases from organizational modeling
Use cases diagrams in the Unified Modeling Language (UML) have been used for capturing
system functional requirements. However, the system development occurs in a context …
system functional requirements. However, the system development occurs in a context …
A novel identity-based strong designated verifier signature scheme
Unlike ordinary digital signatures, a designated verifier signature scheme makes it possible
for a signer to convince a designated verifier that she has signed a message in such a way …
for a signer to convince a designated verifier that she has signed a message in such a way …