Spam detection on twitter using traditional classifiers

M Mccord, M Chuah - Autonomic and Trusted Computing: 8th International …, 2011 - Springer
Social networking sites have become very popular in recent years. Users use them to find
new friends, updates their existing friends with their latest thoughts and activities. Among …

SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs

C Lai, K Zhang, N Cheng, H Li… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a secure incentive scheme to achieve fair and reliable cooperative
(SIRC) downloading in highway vehicular ad hoc networks (VANETs). SIRC can stimulate …

Post-quantum asynchronous deniable key exchange and the signal handshake

J Brendel, R Fiedler, F Günther, C Janson… - … Conference on Public …, 2022 - Springer
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …

Designated verifier signature schemes: Attacks, new security notions and a new construction

H Lipmaa, G Wang, F Bao - … , ICALP 2005, Lisbon, Portugal, July 11-15 …, 2005 - Springer
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …

Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map

F Laguillaumie, D Vergnaud - … , SCN 2004, Amalfi, Italy, September 8-10 …, 2005 - Springer
Abstract The concept of Designated Verifier Signatures (DVS) was introduced by Jakobsson,
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …

Identity-based strong designated verifier signature schemes

W Susilo, F Zhang, Y Mu - … , ACISP 2004, Sydney, Australia, July 13-15 …, 2004 - Springer
In this paper, we propose an identity based strong designated verifier signature scheme.
Firstly, we provide a generic construction of such schemes. We show that the generic …

Generalized digital certificate for user authentication and key establishment for secure communications

L Harn, J Ren - IEEE Transactions on Wireless …, 2011 - ieeexplore.ieee.org
Public-key digital certificate has been widely used in public-key infrastructure (PKI) to
provide user public key authentication. However, the public-key digital certificate itself …

Quantum public-key designated verifier signature

X **n, L Ding, C Li, Y Sang, Q Yang, F Li - Quantum Information …, 2022 - Springer
Based on the single-qubit rotations, a quantum public-key designated verifier signature
(DVS) is proposed. In this scheme, a rotation vector is employed as the signatory's secret …

Deriving use cases from organizational modeling

VFA Santander, JFB Castro - Proceedings IEEE joint …, 2002 - ieeexplore.ieee.org
Use cases diagrams in the Unified Modeling Language (UML) have been used for capturing
system functional requirements. However, the system development occurs in a context …

A novel identity-based strong designated verifier signature scheme

B Kang, C Boyd, ED Dawson - Journal of Systems and Software, 2009 - Elsevier
Unlike ordinary digital signatures, a designated verifier signature scheme makes it possible
for a signer to convince a designated verifier that she has signed a message in such a way …