![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "signature generation"
@article{DBLP:journals/mta/PandeyBS24, author = {Sachi Pandey and Ritin Behl and Amit Sinha}, title = {Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment}, journal = {Multim. Tools Appl.}, volume = {83}, number = {16}, pages = {47269--47293}, year = {2024} }
@article{DBLP:journals/cbm/LazebnikK23, author = {Teddy Lazebnik and Liron Simon Keren}, title = {Cancer-inspired genomics mapper model for the generation of synthetic {DNA} sequences with desired genomics signatures}, journal = {Comput. Biol. Medicine}, volume = {164}, pages = {107221}, year = {2023} }
@article{DBLP:journals/eswa/ArabNC23, author = {Naouel Arab and Hassiba Nemmour and Youcef Chibani}, title = {A new synthetic feature generation scheme based on artificial immune systems for robust offline signature verification}, journal = {Expert Syst. Appl.}, volume = {213}, number = {Part}, pages = {119306}, year = {2023} }
@article{DBLP:journals/jip/KobayashiKKO23, author = {Masaki Kobayashi and Yo Kanemoto and Daisuke Kotani and Yasuo Okabe}, title = {Generation of {IDS} Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities}, journal = {J. Inf. Process.}, volume = {31}, pages = {591--601}, year = {2023} }
@article{DBLP:journals/sensors/SimESYKS23, author = {Minjoo Sim and Siwoo Eum and Gyeongju Song and Yujin Yang and Wonwoong Kim and Hwajeong Seo}, title = {{K-XMSS} and {K-SPHINCS+:} Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms}, journal = {Sensors}, volume = {23}, number = {17}, pages = {7558}, year = {2023} }
@inproceedings{DBLP:conf/africacrypt/NguyenG23, author = {Duc Tri Nguyen and Kris Gaj}, title = {Fast Falcon Signature Generation and Verification Using ARMv8 {NEON} Instructions}, booktitle = {{AFRICACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {14064}, pages = {417--441}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/eicc/RomeroMAARV23, author = {Agust{\'{\i}}n Walabonso Lara Romero and Juan Antonio Ternero Mu{\~{n}}iz and Rafael M. Estepa{-}Alonso and Antonio Jose Estepa Alonso and Fernando Ruiz Robles and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, title = {{HTTP} Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments}, booktitle = {{EICC}}, pages = {65--70}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/ihci/KumarSRS23, author = {Suneel Kumar and Mona Singh and Ruchilekha and Manoj Kumar Singh}, title = {Semantic Segmentation Based Image Signature Generation for {CBIR}}, booktitle = {{IHCI} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {14532}, pages = {319--329}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/irps/MalikJCMKSBVS23, author = {Rasik Rashid Malik and Vipin Joshi and Rajarshi Roy Chaudhuri and Mehak Ashraf Mir and Zubear Khan and Avinas N. Shaji and Madhura Bhattacharya and Anup T. Vitthal and Mayank Shrivastava}, title = {Signatures of Positive Gate Over-Drive Induced Hole Trap Generation and its Impact on p-GaN Gate Stack Instability in AlGaN/GaN HEMTs}, booktitle = {{IRPS}}, pages = {1--4}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/mwscas/SenC23, author = {Ovishake Sen and Baibhab Chatterjee}, title = {Invited: Ring-Oscillator Physical Unclonable Function {(RO-PUF)} Based {PRBS} Generation as a Device Signature in Distributed Brain Implants}, booktitle = {{MWSCAS}}, pages = {439--443}, publisher = {{IEEE}}, year = {2023} }
@article{DBLP:journals/corr/abs-2301-01315, author = {Pere D{\'{\i}}az Lozano and Toni Lozano Bag{\'{e}}n and Josep Vives}, title = {Neural SDEs for Conditional Time Series Generation and the Signature-Wasserstein-1 metric}, journal = {CoRR}, volume = {abs/2301.01315}, year = {2023} }
@article{DBLP:journals/corr/abs-2305-01475, author = {Teddy Lazebnik and Liron Simon Keren}, title = {Cancer-inspired Genomics Mapper Model for the Generation of Synthetic {DNA} Sequences with Desired Genomics Signatures}, journal = {CoRR}, volume = {abs/2305.01475}, year = {2023} }
@article{DBLP:journals/corr/abs-2305-05775, author = {Ovishake Sen and Baibhab Chatterjee}, title = {Modified Ring-Oscillator Physical Unclonable Function {(RO-PUF)} based {PRBS} Generation as a Device Signature in Distributed Brain Implants}, journal = {CoRR}, volume = {abs/2305.05775}, year = {2023} }
@article{DBLP:journals/jetc/ThompsonW22, author = {David Thompson and Haibo Wang}, title = {Integrated Power Signature Generation Circuit for IoT Abnormality Detection}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {18}, number = {1}, pages = {5:1--5:13}, year = {2022} }
@inproceedings{DBLP:conf/coolchips/MasadaNI22, author = {Kaoru Masada and Ryohei Nakayama and Makoto Ikeda}, title = {Hardware Acceleration of Aggregate Signature Generation and Authentication by {BLS} Signature over {BLS12-381} curve}, booktitle = {{COOL} {CHIPS}}, pages = {1--3}, publisher = {{IEEE}}, year = {2022} }
@inproceedings{DBLP:conf/icpr/ShiWL22, author = {Zhixin Shi and Xiangyu Wang and Pengcheng Liu}, title = {{NBP-MS:} Malware Signature Generation Based on Network Behavior Profiling}, booktitle = {{ICPR}}, pages = {1865--1870}, publisher = {{IEEE}}, year = {2022} }
@article{DBLP:journals/mta/ChandrasekaranT21, author = {Lakshmi Chandrasekaran and Karuppuswamy Thenmozhi and John Bosco Balaguru Rayappan and Rengarajan Amirtharajan}, title = {Genetic and chaotic signatures in offspring - an encrypted generation of image family}, journal = {Multim. Tools Appl.}, volume = {80}, number = {6}, pages = {8581--8609}, year = {2021} }
@inproceedings{DBLP:conf/cikm/DuHH21, author = {Min Du and Wenjun Hu and William Hewlett}, title = {AutoCombo: Automatic Malware Signature Generation Through Combination Rule Mining}, booktitle = {{CIKM}}, pages = {3777--3786}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/icmc2/Ikematsu21, author = {Yasuhiko Ikematsu}, title = {A Study on Randomness Used in Signature Generation of {UOV}}, booktitle = {{ICMC}}, series = {Advances in Intelligent Systems and Computing}, volume = {1412}, pages = {39--50}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/igarss/AlnujaimK21, author = {Ibrahim Alnujaim and Youngwook Kim}, title = {Application of Conditional Generative Adversarial Networks for Generation of Micro-Doppler Signatures of Different Aspect Angles}, booktitle = {{IGARSS}}, pages = {5056--5058}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/iscas/SongHWTW21, author = {Yifeng Song and Xiao Hu and Wenhao Wang and Jing Tian and Zhongfeng Wang}, title = {High-Speed and Scalable {FPGA} Implementation of the Key Generation for the Leighton-Micali Signature Protocol}, booktitle = {{ISCAS}}, pages = {1--5}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/nca/KapoorFQ21, author = {Maya Kapoor and Garrett Fuchs and Jonathan Quance}, title = {RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection}, booktitle = {{NCA}}, pages = {1--9}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/sacrypt/KosugeT21, author = {Haruhisa Kosuge and Hidema Tanaka}, title = {Simple and Memory-Efficient Signature Generation of {\textdollar}{\textbackslash}mathrm \{XMSS\{MT\}\}{\textdollar}}, booktitle = {{SAC}}, series = {Lecture Notes in Computer Science}, volume = {13203}, pages = {377--397}, publisher = {Springer}, year = {2021} }
@article{DBLP:journals/iet-ifs/FengHWWH20, author = {Qi Feng and Debiao He and Huaqun Wang and Ding Wang and Xinyi Huang}, title = {Multi-party key generation protocol for the identity-based signature scheme in the {IEEE} {P1363} standard for public key cryptography}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {6}, pages = {724--732}, year = {2020} }
@article{DBLP:journals/ijcat/ShinRIY20, author = {Jungpil Shin and Md. Abdur Rahim and Md. Rashedul Islam and Keun Soo Yun}, title = {A novel approach of cursive signature generation for personal identity}, journal = {Int. J. Comput. Appl. Technol.}, volume = {62}, number = {4}, pages = {384--394}, year = {2020} }
@article{DBLP:journals/ijgi/ChenHLAH20, author = {Ting Chen and Haiqing He and Dajun Li and Puyang An and Zhenyang Hui}, title = {Damage Signature Generation of Revetment Surface along Urban Rivers Using UAV-Based Mapping}, journal = {{ISPRS} Int. J. Geo Inf.}, volume = {9}, number = {4}, pages = {283}, year = {2020} }
@article{DBLP:journals/ijon/RuizLSV20, author = {Victoria Ru{\'{\i}}z and Ismael Linares and {\'{A}}ngel S{\'{a}}nchez and Jos{\'{e}} Francisco V{\'{e}}lez}, title = {Off-line handwritten signature verification using compositional synthetic generation of signatures and Siamese Neural Networks}, journal = {Neurocomputing}, volume = {374}, pages = {30--41}, year = {2020} }
@article{DBLP:journals/jaiscr/ZalasinskiCLWP20, author = {Marcin Zalasinski and Krzysztof Cpalka and Lukasz Laskowski and Donald C. Wunsch and Krzysztof Przybyszewski}, title = {An Algorithm for the Evolutionary-Fuzzy Generation of on-Line Signature Hybrid Descriptors}, journal = {J. Artif. Intell. Soft Comput. Res.}, volume = {10}, number = {3}, pages = {173--187}, year = {2020} }
@article{DBLP:journals/nar/StathiasTKVCFPT20, author = {Vasileios Stathias and John Paul Turner and Amar Koleti and Dusica Vidovic and Daniel J. Cooper and Mehdi Fazel{-}Najafabadi and Marcin Pilarczyk and Raymond Terryn and Caty Chung and Afoma Umeano and Daniel J. B. Clarke and Alexander Lachmann and John Erol Evangelista and Avi Ma'ayan and Mario Medvedovic and Stephan C. Sch{\"{u}}rer}, title = {{LINCS} Data Portal 2.0: next generation access point for perturbation-response signatures}, journal = {Nucleic Acids Res.}, volume = {48}, number = {Database-Issue}, pages = {D431--D439}, year = {2020} }
@article{DBLP:journals/nca/KaurS20, author = {Sanmeet Kaur and Maninder Singh}, title = {Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks}, journal = {Neural Comput. Appl.}, volume = {32}, number = {12}, pages = {7859--7877}, year = {2020} }
@article{DBLP:journals/nn/NahmiasCNE20, author = {Daniel Nahmias and Aviad Cohen and Nir Nissim and Yuval Elovici}, title = {Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments}, journal = {Neural Networks}, volume = {124}, pages = {243--257}, year = {2020} }
@article{DBLP:journals/tcs/KimLH20, author = {Gyu{-}Chol Kim and Su{-}Chol Li and Hak{-}Chol Hwang}, title = {Fast rebalanced {RSA} signature scheme with typical prime generation}, journal = {Theor. Comput. Sci.}, volume = {830-831}, pages = {1--19}, year = {2020} }
@inproceedings{DBLP:conf/bmei/ZitarNHA20, author = {Raed Abu Zitar and Mirna Nachouki and Hanan Hussain and Farid Alzboun}, title = {Recurrent Neural Networks for Signature Generation}, booktitle = {{CISP-BMEI}}, pages = {1093--1097}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/ccoms/LongX20, author = {Yihong Long and Feng Xiong}, title = {Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption}, booktitle = {{ICCCS}}, pages = {76--81}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/ccs/Kokoris-KogiasM20, author = {Eleftherios Kokoris{-}Kogias and Dahlia Malkhi and Alexander Spiegelman}, title = {Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures}, booktitle = {{CCS}}, pages = {1751--1767}, publisher = {{ACM}}, year = {2020} }
@inproceedings{DBLP:conf/emnlp/WeirSD20, author = {Nathaniel Weir and Jo{\~{a}}o Sedoc and Benjamin Van Durme}, title = {{COD3S:} Diverse Generation with Discrete Semantic Signatures}, booktitle = {{EMNLP} {(1)}}, pages = {5199--5211}, publisher = {Association for Computational Linguistics}, year = {2020} }
@inproceedings{DBLP:conf/ewdts/ChesnokovKCSCP20, author = {Nikita I. Chesnokov and Denis A. Korochentsev and Larissa V. Cherckesova and Olga A. Safaryan and Vladislav E. Chumakov and Irina A. Pilipenko}, title = {Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation}, booktitle = {{EWDTS}}, pages = {1--5}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/iccsp/LongX20, author = {Yihong Long and Feng Xiong}, title = {Secret Sharing Based {BLMQ} Signature Generation}, booktitle = {{ICCSP}}, pages = {6--12}, publisher = {{ACM}}, year = {2020} }
@inproceedings{DBLP:conf/icct/YeL20, author = {Wenlan Ye and Yihong Long}, title = {Two Party Generation of {SM9} Digital Signature}, booktitle = {{ICCT}}, pages = {1556--1560}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/mwscas/ThompsonSW20, author = {David E. Thompson and Md Kamruzzaman Shuvo and Haibo Wang}, title = {Digital {LDO} Based Power Signature Generation Circuit for IoT Security}, booktitle = {{MWSCAS}}, pages = {1076--1079}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/provsec/KajitaONT20, author = {Kaisei Kajita and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi}, title = {Short Lattice Signatures in the Standard Model with Efficient Tag Generation}, booktitle = {ProvSec}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {85--102}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/trustcom/FengHLLC20, author = {Qi Feng and Debiao He and Min Luo and Zengxiang Li and Kim{-}Kwang Raymond Choo}, title = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency}, booktitle = {TrustCom}, pages = {137--147}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/trustcom/ZhangTCXLX20, author = {Runzi Zhang and Mingkai Tong and Lei Chen and Jianxin Xue and Wenmao Liu and Feng Xie}, title = {CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic}, booktitle = {TrustCom}, pages = {736--743}, publisher = {{IEEE}}, year = {2020} }
@article{DBLP:journals/corr/abs-2010-02882, author = {Nathaniel Weir and Jo{\~{a}}o Sedoc and Benjamin Van Durme}, title = {{COD3S:} Diverse Generation with Discrete Semantic Signatures}, journal = {CoRR}, volume = {abs/2010.02882}, year = {2020} }
@article{DBLP:journals/eecs/JagadeeshDBR19, author = {Kokila Jagadeesh and Arjun Murali Das and B. Shameedha Begum and Natarajan Ramasubramanian}, title = {Hardware Signature Generation Using a Hybrid {PUF} and {FSM} Model for an SoC Architecture}, journal = {Period. Polytech. Electr. Eng. Comput. Sci.}, volume = {63}, number = {4}, pages = {244--253}, year = {2019} }
@article{DBLP:journals/ieicet/ItoK19, author = {Hiroshi Ito and Tadashi Kasezawa}, title = {Permutation-Based Signature Generation for Spread-Spectrum Video Watermarking}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {1}, pages = {31--40}, year = {2019} }
@article{DBLP:journals/iotj/ChangLLGP19, author = {Chin{-}Chen Chang and Wai{-}Kong Lee and Yanjun Liu and Bok{-}Min Goi and Raphael C.{-}W. Phan}, title = {Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by {GPU}}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4448--4461}, year = {2019} }
@article{DBLP:journals/jise/ZhaoYZ19, author = {Pu Zhao and Jia Yu and Hanlin Zhang}, title = {Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing}, journal = {J. Inf. Sci. Eng.}, volume = {35}, number = {3}, pages = {635--650}, year = {2019} }
@article{DBLP:journals/js/BaeKA19, author = {Tae{-}Wuk Bae and Young{-}Choon Kim and Sang{-}Ho Ahn}, title = {{IR} Composite Image Generation by Wavelength Band Based on Temperature Synthesis Estimated from {IR} Target Signature and Background Scene}, journal = {J. Sensors}, volume = {2019}, pages = {9423976:1--9423976:17}, year = {2019} }
@inproceedings{DBLP:conf/ats/HiramotoOT19, author = {Yushiro Hiramoto and Satoshi Ohtake and Hiroshi Takahashi}, title = {A Built-In Self-Diagnostic Mechanism for Delay Faults Based on Self-Generation of Expected Signatures}, booktitle = {{ATS}}, pages = {31--36}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/cis/LongC19, author = {Yihong Long and Minyang Cheng}, title = {Secret Sharing Based {SM2} Digital Signature Generation using Homomorphic Encryption}, booktitle = {{CIS}}, pages = {252--256}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/cis/ShanYGJWL19, author = {Weijun Shan and Jun Yu and Limin Guo and Kun Jiang and Lihui Wang and Qing Li}, title = {A Horizontal Attack on {SM9} Signature Generation}, booktitle = {{CIS}}, pages = {306--309}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/eurosp/Zhdanov19, author = {Alexander Zhdanov}, title = {Generation of Static YARA-Signatures Using Genetic Algorithm}, booktitle = {EuroS{\&}P Workshops}, pages = {220--228}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/fnss/QiuLW19, author = {Jian Qiu and Hengjian Li and Xiyu Wang}, title = {Cancelable Palmprint Feature Generation Method Based on Minimum Signature}, booktitle = {{FNSS}}, series = {Communications in Computer and Information Science}, volume = {1113}, pages = {118--127}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/icaiic/ChoiKPC19, author = {Kiho Choi and Hyeongrae Kim and Daejin Park and Jeonghun Cho}, title = {Automatic Multi-Thread Code Generation for Monitoring Signature-based Control Flow}, booktitle = {{ICAIIC}}, pages = {28--33}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/icbk/ZhangHHCT19, author = {Yuanming Zhang and Ting Han and Zelin Hao and Yu Cao and Jing Tao}, title = {An Efficient Application Traffic Signature Generation System}, booktitle = {{ICBK}}, pages = {341--347}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/ijcnn/NahmiasCNE19, author = {Daniel Nahmias and Aviad Cohen and Nir Nissim and Yuval Elovici}, title = {TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning}, booktitle = {{IJCNN}}, pages = {1--8}, publisher = {{IEEE}}, year = {2019} }
@article{DBLP:journals/corr/abs-1905-00154, author = {Saeed Valizadeh and Marten van Dijk}, title = {On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware}, journal = {CoRR}, volume = {abs/1905.00154}, year = {2019} }
@article{DBLP:journals/access/AtzeniDMSST18, author = {Andrea S. Atzeni and Fernando Diaz and Andrea Marcelli and Antonio S{\'{a}}nchez and Giovanni Squillero and Alberto Paolo Tonda}, title = {Countering Android Malware: {A} Scalable Semi-Supervised Approach for Family-Signature Generation}, journal = {{IEEE} Access}, volume = {6}, pages = {59540--59556}, year = {2018} }
@article{DBLP:journals/ejwcn/YiN18, author = {Haibo Yi and Zhe Nie}, title = {High-speed hardware architecture for implementations of multivariate signature generations on FPGAs}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {93}, year = {2018} }
@article{DBLP:journals/ieicet/SugiyamaAI18, author = {Shotaro Sugiyama and Hiromitsu Awano and Makoto Ikeda}, title = {Low Latency 256-bit {\textdollar}mathbb\{F\}{\_}p{\textdollar} {ECDSA} Signature Generation Crypto Processor}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {12}, pages = {2290--2296}, year = {2018} }
@article{DBLP:journals/itiis/PengT18, author = {Zhiniang Peng and Shaohua Tang}, title = {Circulant {UOV:} a new {UOV} variant with shorter private key and faster signature generation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {3}, pages = {1376--1395}, year = {2018} }
@article{DBLP:journals/itiis/SijaSK18, author = {Baraka D. Sija and Kyu{-}Seok Shim and Myung{-}Sup Kim}, title = {Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {4}, pages = {1572--1593}, year = {2018} }
@article{DBLP:journals/jihmsp/MengT18, author = {Lei Meng and Lin Teng}, title = {Karhunen Loeve Transform-based Online Handwritten Signature Scheme via Dynamic Bit Allocation Method and Naive Bayes for Biometric Key Generation}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {9}, number = {4}, pages = {896--903}, year = {2018} }
@article{DBLP:journals/jwe/TangLC18, author = {Yazhe Tang and Xun Li and Lishui Chen}, title = {{STAFF:} Automated Signature Generationfor Fine-Grained FunctionTraffic Identification}, journal = {J. Web Eng.}, volume = {17}, number = {5}, pages = {71--94}, year = {2018} }
@article{DBLP:journals/tdsc/LeeKLCYLL18, author = {Suchul Lee and Sungho Kim and Sungil Lee and Jaehyuk Choi and Hanjun Yoon and Dohoon Lee and Jun{-}Rak Lee}, title = {LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {771--783}, year = {2018} }
@inproceedings{DBLP:conf/asscc/SugiyamaAI18, author = {Shotaro Sugiyama and Hiromitsu Awano and Makoto Ikeda}, title = {31.3 {\(\mu\)}s/Signature-Generation 256-bit {\unicode{54589}}p {ECDSA} Cryptoprocessor}, booktitle = {{A-SSCC}}, pages = {153--156}, publisher = {{IEEE}}, year = {2018} }
@inproceedings{DBLP:conf/cns/AlhanahnahLYZC18, author = {Mohannad Alhanahnah and Qicheng Lin and Qiben Yan and Ning Zhang and Zhenxiang Chen}, title = {Efficient Signature Generation for Classifying Cross-Architecture IoT Malware}, booktitle = {{CNS}}, pages = {1--9}, publisher = {{IEEE}}, year = {2018} }
@inproceedings{DBLP:conf/igarss/OzdilEDO18, author = {Omer Ozdil and Yunus Emre Esin and Berkan Demirel and Safak Ozturk}, title = {Representative Signature Generation for Plant Detection in Hyperspectral Images}, booktitle = {{IGARSS}}, pages = {2709--2712}, publisher = {{IEEE}}, year = {2018} }
@inproceedings{DBLP:conf/iseaisap/NaderiVCPA18, author = {Hassan Naderi and P. Vinod and Mauro Conti and Saeed Parsa and Mohammad Hadi Alaeiyan}, title = {Malware Signature Generation Using Locality Sensitive Hashing}, booktitle = {{ISEA-ISAP}}, series = {Communications in Computer and Information Science}, volume = {939}, pages = {115--124}, publisher = {Springer}, year = {2018} }
@article{DBLP:journals/access/PengT17, author = {Zhiniang Peng and Shaohua Tang}, title = {Circulant Rainbow: {A} New Rainbow Variant With Shorter Private Key and Faster Signature Generation}, journal = {{IEEE} Access}, volume = {5}, pages = {11877--11886}, year = {2017} }
@article{DBLP:journals/jise/ShimYLK17, author = {Kyu{-}Seok Shim and Sung{-}Ho Yoon and Su{-}Kang Lee and Myung{-}Sup Kim}, title = {SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {2}, pages = {537--569}, year = {2017} }
@article{DBLP:journals/jocs/Niewiadomska-Szynkiewicz17, author = {Ewa Niewiadomska{-}Szynkiewicz and Adam Kozakiewicz}, title = {Design and evaluation of a system for network threat signatures generation}, journal = {J. Comput. Sci.}, volume = {22}, pages = {187--197}, year = {2017} }
@article{DBLP:journals/pami/CabreraFES17, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Miguel A. Ferrer and George S. Eskander and Robert Sabourin}, title = {Generation of Duplicated Off-Line Signature Images for Verification Systems}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {39}, number = {5}, pages = {951--964}, year = {2017} }
@inproceedings{DBLP:conf/dasc/ShahriarB17, author = {Hossain Shahriar and William Bond}, title = {Towards an Attack Signature Generation Framework for Intrusion Detection Systems}, booktitle = {DASC/PiCom/DataCom/CyberSciTech}, pages = {597--603}, publisher = {{IEEE} Computer Society}, year = {2017} }
@inproceedings{DBLP:conf/smartgridcomm/BuneevaR17, author = {Nadezda Buneeva and Andreas Reinhardt}, title = {{AMBAL:} Realistic load signature generation for load disaggregation performance evaluation}, booktitle = {SmartGridComm}, pages = {443--448}, publisher = {{IEEE}}, year = {2017} }
@article{DBLP:journals/corr/abs-1711-08336, author = {Eli David and Nathan S. Netanyahu}, title = {DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification}, journal = {CoRR}, volume = {abs/1711.08336}, year = {2017} }
@article{DBLP:journals/ieicet/ShaoKVP16, author = {Min Shao and Min Sik Kim and Victor C. Valgenti and Jungkeun Park}, title = {Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {8}, pages = {2090--2099}, year = {2016} }
@article{DBLP:journals/ieicet/TamuraI16, author = {Masato Tamura and Makoto Ikeda}, title = {Montgomery Multiplier Design for {ECDSA} Signature Generation Processor}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {12}, pages = {2444--2452}, year = {2016} }
@article{DBLP:journals/iet-ifs/SalazarTP16, author = {Jos{\'{e}} Luis Salazar and Jos{\'{e}} Luis Tornos and Joan Josep Piles}, title = {Efficient ways of prime number generation for ring signatures}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {1}, pages = {33--36}, year = {2016} }
@inproceedings{DBLP:conf/asscc/TamuraI16, author = {Masato Tamura and Makoto Ikeda}, title = {1.68{\(\mu\)}J/signature-generation 256-bit {ECDSA} over GF(p) signature generator for IoT devices}, booktitle = {{A-SSCC}}, pages = {341--344}, publisher = {{IEEE}}, year = {2016} }
@inproceedings{DBLP:conf/bigdataconf/JupinSD16, author = {Joseph Jupin and Justin Y. Shi and Eduard C. Dragut}, title = {{PSH:} {A} probabilistic signature hash method with hash neighborhood candidate generation for fast edit-distance string comparison on big data}, booktitle = {{IEEE} BigData}, pages = {122--127}, publisher = {{IEEE} Computer Society}, year = {2016} }
@inproceedings{DBLP:conf/caise/BohmerR16, author = {Kristof B{\"{o}}hmer and Stefanie Rinderle{-}Ma}, title = {Automatic Signature Generation for Anomaly Detection in Business Process Instance Data}, booktitle = {{BMMDS/EMMSAD}}, series = {Lecture Notes in Business Information Processing}, volume = {248}, pages = {196--211}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/ic-nc/SowaSYM16, author = {Taiki Sowa and Suguru Sunada and Yasushi Yamazaki and Takeru Miyazaki}, title = {Biometric Bit String Generation from Handwritten Signatures on Smart Device}, booktitle = {{CANDAR}}, pages = {662--665}, publisher = {{IEEE} Computer Society}, year = {2016} }
@inproceedings{DBLP:conf/icde/Kim0X16, author = {Jongik Kim and Chen Li and Xiaohui Xie}, title = {Hobbes3: Dynamic generation of variable-length signatures for efficient approximate subsequence mappings}, booktitle = {{ICDE}}, pages = {169--180}, publisher = {{IEEE} Computer Society}, year = {2016} }
@inproceedings{DBLP:conf/icfhr/CabreraCFBMCAP16, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Sukalpa Chanda and Miguel A. Ferrer and Chayan Kumar Banerjee and Anirban Majumdar and Cristina Carmona{-}Duarte and Parikshit Acharya and Umapada Pal}, title = {Multiple Generation of Bengali Static Signatures}, booktitle = {{ICFHR}}, pages = {42--47}, publisher = {{IEEE} Computer Society}, year = {2016} }
@inproceedings{DBLP:conf/ictc/ChoiLCKK16a, author = {Sunoh Choi and Jooyoung Lee and Yangseo Choi and Jonghyun Kim and Ikkyun Kim}, title = {Hierarchical network signature clustering and generation}, booktitle = {{ICTC}}, pages = {1191--1193}, publisher = {{IEEE}}, year = {2016} }
@inproceedings{DBLP:conf/iwci/ChakrabortyRRU16, author = {Narayan Ranjan Chakraborty and Muhammad Taifur Rahman and Md. Ekhlasur Rahman and Mohammad Shorif Uddin}, title = {Generation and verification of digital signature with two factor authentication}, booktitle = {{IWCI}}, pages = {131--135}, publisher = {{IEEE}}, year = {2016} }
@inproceedings{DBLP:conf/noms/Vasilomanolakis16a, author = {Emmanouil Vasilomanolakis and Shreyas Srinivasa and Carlos Garcia Cordero and Max M{\"{u}}hlh{\"{a}}user}, title = {Multi-stage attack detection and signature generation with {ICS} honeypots}, booktitle = {{NOMS}}, pages = {1227--1232}, publisher = {{IEEE}}, year = {2016} }
@inproceedings{DBLP:conf/rait/BhowmickSMB16, author = {Shib Sankar Bhowmick and Indrajit Saha and Ujjwal Maulik and Debotosh Bhattacharjee}, title = {Identification of miRNA signature using Next-Generation Sequencing data of prostate cancer}, booktitle = {{RAIT}}, pages = {528--533}, publisher = {{IEEE}}, year = {2016} }
@inproceedings{DBLP:conf/smartcloud/ShangPLL16, author = {Tao Shang and Tianli Peng and Qi Lei and Jianwei Liu}, title = {Homomorphic Signature for Generation-based Network Coding}, booktitle = {SmartCloud}, pages = {269--273}, publisher = {{IEEE} Computer Society}, year = {2016} }
@inproceedings{DBLP:conf/spaccs/WangW16, author = {Jie Wang and Jie Wu}, title = {A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic Worm}, booktitle = {SpaCCS}, series = {Lecture Notes in Computer Science}, volume = {10066}, pages = {109--121}, year = {2016} }
@article{DBLP:journals/compsec/Garcia-TeodoroD15, author = {Pedro Garc{\'{\i}}a{-}Teodoro and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Juan E. Tapiador and Rolando Salazar{-}Hern{\'{a}}ndez}, title = {Automatic generation of {HTTP} intrusion signatures by selective identification of anomalies}, journal = {Comput. Secur.}, volume = {55}, pages = {159--174}, year = {2015} }
@article{DBLP:journals/cryptologia/Horng15, author = {Gwoboa Horng}, title = {Accelerating {DSA} Signature Generation}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {121--125}, year = {2015} }
@article{DBLP:journals/ijssc/KuzunoT15, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Detection of sensitive information leakage in Android applications using signature generation}, journal = {Int. J. Space Based Situated Comput.}, volume = {5}, number = {1}, pages = {53--62}, year = {2015} }
@article{DBLP:journals/scn/HaoWLR15, author = {Sun Hao and Wen Wang and Huabiao Lu and Peige Ren}, title = {AutoMal: automatic clustering and signature generation for malwares based on the network flow}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1845--1854}, year = {2015} }
@inproceedings{DBLP:conf/cisc/TanT15, author = {Yang Tan and Shaohua Tang}, title = {Two Approaches to Build {UOV} Variants with Shorter Private Key and Faster Signature Generation}, booktitle = {Inscrypt}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {57--74}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/ica3pp/WangH15, author = {Jie Wang and Xiaoxian He}, title = {A Novel Signature Generation Approach for Polymorphic Worms}, booktitle = {{ICA3PP} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {9530}, pages = {369--382}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/ijcnn/DavidN15, author = {Omid E. David and Nathan S. Netanyahu}, title = {DeepSign: Deep learning for automatic malware signature generation and classification}, booktitle = {{IJCNN}}, pages = {1--8}, publisher = {{IEEE}}, year = {2015} }
@inproceedings{DBLP:conf/infocom/XuLMMBNA15, author = {Qiang Xu and Yong Liao and Stanislav Miskovic and Zhuoqing Morley Mao and Mario Baldi and Antonio Nucci and Thomas Andrews}, title = {Automatic generation of mobile app signatures from traffic observations}, booktitle = {{INFOCOM}}, pages = {1481--1489}, publisher = {{IEEE}}, year = {2015} }
@inproceedings{DBLP:conf/intrust/WangH15, author = {Jie Wang and Xiaoxian He}, title = {A Signature Generation Approach Based on Clustering for Polymorphic Worm}, booktitle = {{INTRUST}}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {84--96}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/pkc/CashDK15, author = {David Cash and Rafael Dowsley and Eike Kiltz}, title = {Digital Signatures from Strong {RSA} without Prime Generation}, booktitle = {Public Key Cryptography}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {217--235}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/ica3pp/YangWZ14, author = {Lili Yang and Jie Wang and Ping Zhong}, title = {Combining Supervised and Unsupervised Learning for Automatic Attack Signature Generation System}, booktitle = {{ICA3PP} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8630}, pages = {607--618}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/icfhr/CabreraGMFG14, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Marta Gomez{-}Barrero and Aythami Morales and Miguel Angel Ferrer{-}Ballester and Javier Galbally}, title = {Generation of Enhanced Synthetic Off-Line Signatures Based on Real On-Line Data}, booktitle = {{ICFHR}}, pages = {482--487}, publisher = {{IEEE} Computer Society}, year = {2014} }
@inproceedings{DBLP:conf/icst/AydinAB14, author = {Abdulbaki Aydin and Muath Alkhalaf and Tevfik Bultan}, title = {Automated Test Generation from Vulnerability Signatures}, booktitle = {{ICST}}, pages = {193--202}, publisher = {{IEEE} Computer Society}, year = {2014} }
@inproceedings{DBLP:conf/iolts/HobeikaPLTBA14, author = {Christelle Hobeika and Simon Pichette and M. A. Leonard and Claude Thibeault and Jean{-}Fran{\c{c}}ois Boland and Yves Audet}, title = {Multi-abstraction level signature generation and comparison based on radiation single event upset}, booktitle = {{IOLTS}}, pages = {212--215}, publisher = {{IEEE}}, year = {2014} }
@inproceedings{DBLP:conf/snds/KaurS14, author = {Ratinder Kaur and Maninder Singh}, title = {Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks}, booktitle = {{SNDS}}, series = {Communications in Computer and Information Science}, volume = {420}, pages = {298--309}, publisher = {Springer}, year = {2014} }
@article{DBLP:journals/ieeesp/KaurS13, author = {Sanmeet Kaur and Maninder Singh}, title = {Automatic Attack Signature Generation Systems: {A} Review}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {6}, pages = {54--61}, year = {2013} }
@article{DBLP:journals/ijdc/Spencer13, author = {Ross Spencer}, title = {Generation of a Skeleton Corpus of Digital Objects for the Validation and Evaluation of Format Identification Tools and Signatures}, journal = {Int. J. Digit. Curation}, volume = {8}, number = {1}, pages = {120--130}, year = {2013} }
@article{DBLP:journals/jcp/AltwaijryS13, author = {Hesham Altwaijry and Khalid Shahbar}, title = {{(WHASG)} Automatic {SNORT} Signatures Generation by using Honeypot}, journal = {J. Comput.}, volume = {8}, number = {12}, pages = {3280--3286}, year = {2013} }
@inproceedings{DBLP:conf/apnoms/KimC13, author = {Hwan{-}Hee Kim and Mi{-}Jung Choi}, title = {Towards automatic signature generation for identification of HTTP-based applications}, booktitle = {{APNOMS}}, pages = {1--3}, publisher = {{IEEE}}, year = {2013} }
@inproceedings{DBLP:conf/ccs/YasudaDTS13, author = {Takanori Yasuda and Jintai Ding and Tsuyoshi Takagi and Kouichi Sakurai}, title = {A variant of rainbow with shorter secret key and faster signature generation}, booktitle = {AsiaPKC@AsiaCCS}, pages = {57--62}, publisher = {{ACM}}, year = {2013} }
@inproceedings{DBLP:conf/icb/Ferrer-BallesterCM13, author = {Miguel Angel Ferrer{-}Ballester and Mois{\'{e}}s D{\'{\i}}az Cabrera and Aythami Morales}, title = {Synthetic off-line signature image generation}, booktitle = {{ICB}}, pages = {1--7}, publisher = {{IEEE}}, year = {2013} }
@inproceedings{DBLP:conf/icde/KuzunoT13, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Signature generation for sensitive information leakage in android applications}, booktitle = {{ICDE} Workshops}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2013} }
@inproceedings{DBLP:conf/iciap/PirloIPOCGR13, author = {Giuseppe Pirlo and Donato Impedovo and Rejean Plamondon and Christian O'Reilly and A. Cozzolongo and R. Gravinese and Andrea Rollo}, title = {Stability of Dynamic Signatures: From the Representation to the Generation Domain}, booktitle = {{ICIAP} Workshops}, series = {Lecture Notes in Computer Science}, volume = {8158}, pages = {122--130}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13, author = {Huabiao Lu and Baokang Zhao and Xiaofeng Wang and Jinshu Su}, title = {DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation}, booktitle = {ICT-EurAsia}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {271--284}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/raid/RafiqueC13, author = {M. Zubair Rafique and Juan Caballero}, title = {{FIRMA:} Malware Clustering and Network Signature Generation with Mixed Network Behaviors}, booktitle = {{RAID}}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {144--163}, publisher = {Springer}, year = {2013} }
@article{DBLP:journals/corr/abs-1305-4045, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Signature Generation for Sensitive Information Leakage in Android Applications}, journal = {CoRR}, volume = {abs/1305.4045}, year = {2013} }
@article{DBLP:journals/itc/VenckauskasJMM12, author = {Algimantas Venckauskas and Nerijus Jusas and Irena Mikuckiene and Stasys Maciulevicius}, title = {Generation of the Secret Encryption Key Using the Signature of the Embedded System}, journal = {Inf. Technol. Control.}, volume = {41}, number = {4}, pages = {368--375}, year = {2012} }
@article{DBLP:journals/pik/VogelRS12, author = {Michael Vogel and Ren{\'{e}} Rietz and Sebastian Schmerl}, title = {Automated Generation of Precise Signatures}, journal = {Prax. Inf.verarb. Kommun.}, volume = {35}, number = {1}, pages = {40--45}, year = {2012} }
@article{DBLP:journals/pr/GalballyFOP12, author = {Javier Galbally and Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia and R{\'{e}}jean Plamondon}, title = {Synthetic on-line signature generation. Part {II:} Experimental validation}, journal = {Pattern Recognit.}, volume = {45}, number = {7}, pages = {2622--2632}, year = {2012} }
@article{DBLP:journals/pr/GalballyPFO12, author = {Javier Galbally and R{\'{e}}jean Plamondon and Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia}, title = {Synthetic on-line signature generation. Part {I:} Methodology and algorithms}, journal = {Pattern Recognit.}, volume = {45}, number = {7}, pages = {2610--2621}, year = {2012} }
@inproceedings{DBLP:conf/iccomm/SerbP12, author = {Mihai Serb and Victor Valeriu Patriciu}, title = {Using MTMs to secure electronic signatures generation}, booktitle = {{COMM}}, pages = {315--318}, publisher = {{IEEE}}, year = {2012} }
@inproceedings{DBLP:conf/visapp/DOrazioG12, author = {Tiziana D'Orazio and Cataldo Guaragnella}, title = {A Graph-based Signature Generation for People Re-identification in a Multi-camera Surveillance System}, booktitle = {{VISAPP} {(1)}}, pages = {414--417}, publisher = {SciTePress}, year = {2012} }
@phdthesis{DBLP:phd/us/Hu11, author = {Xin Hu}, title = {Large Scale Malware Analysis, Detection and Signature Generation}, school = {University of Michigan, {USA}}, year = {2011} }
@article{DBLP:journals/ejasp/LeeC11, author = {Mn{-}Ta Lee and Hsuan T. Chang}, title = {On the pinned field image binarization for signature generation in image ownership verification method}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2011}, pages = {44}, year = {2011} }
@article{DBLP:journals/ijisec/KongJGZLX11, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} semantics aware signature generation for polymorphic worm detection}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {269--283}, year = {2011} }
@article{DBLP:journals/tc/TangXL11, author = {Yong Tang and Bin Xiao and Xicheng Lu}, title = {Signature Tree Generation for Polymorphic Worms}, journal = {{IEEE} Trans. Computers}, volume = {60}, number = {4}, pages = {565--579}, year = {2011} }
@article{DBLP:journals/tsmc/ShabtaiME11, author = {Asaf Shabtai and Eitan Menahem and Yuval Elovici}, title = {F-Sign: Automatic, Function-Based Signature Generation for Malware}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {41}, number = {4}, pages = {494--508}, year = {2011} }
@inproceedings{DBLP:conf/biosig/ScheuermannBH11, author = {Dirk Scheuermann and Bastian Wolfgruber and Olaf Henniger}, title = {On biometric key generation from handwritten signatures}, booktitle = {{BIOSIG}}, series = {{LNI}}, volume = {{P-191}}, pages = {103--114}, publisher = {{GI}}, year = {2011} }
@inproceedings{DBLP:conf/valuetools/SzaboTTMS11, author = {G{\'{e}}za Szab{\'{o}} and Zolt{\'{a}}n Richard Tur{\'{a}}nyi and L{\'{a}}szl{\'{o}} Toka and S{\'{a}}ndor Moln{\'{a}}r and Alysson Santos}, title = {Automatic protocol signature generation framework for deep packet inspection}, booktitle = {{VALUETOOLS}}, pages = {291--299}, publisher = {{ICST/ACM}}, year = {2011} }
@inproceedings{DBLP:conf/vts/BanerjeeSDC11, author = {Aritra Banerjee and Shreyas Sen and Shyam Kumar Devarakond and Abhijit Chatterjee}, title = {Automatic test stimulus generation for accurate diagnosis of {RF} systems using transient response signatures}, booktitle = {{VTS}}, pages = {58--63}, publisher = {{IEEE} Computer Society}, year = {2011} }
@article{DBLP:journals/ijnsec/KattiK10, author = {Rajendra S. Katti and Rajesh G. Kavasseri}, title = {Nonce Generation For The Digital Signature Standard}, journal = {Int. J. Netw. Secur.}, volume = {11}, number = {1}, pages = {23--32}, year = {2010} }
@article{DBLP:journals/ton/WangLCFL10, author = {Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li}, title = {Thwarting zero-day polymorphic worms with network-level length-based signature generation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {53--66}, year = {2010} }
@inproceedings{DBLP:conf/acl/DurmeL10, author = {Benjamin Van Durme and Ashwin Lall}, title = {Online Generation of Locality Sensitive Hash Signatures}, booktitle = {{ACL} {(2)}}, pages = {231--235}, publisher = {The Association for Computer Linguistics}, year = {2010} }
@inproceedings{DBLP:conf/acl/ShezafR10, author = {Daphna Shezaf and Ari Rappoport}, title = {Bilingual Lexicon Generation Using Non-Aligned Signatures}, booktitle = {{ACL}}, pages = {98--107}, publisher = {The Association for Computer Linguistics}, year = {2010} }
@inproceedings{DBLP:conf/aict/Garcia-TeodoroMR10, author = {Pedro Garcia{-}Teodoro and Pablo Mu{\~{n}}oz{-}Feldstedt and David Ruete{-}Z{\'{u}}{\~{n}}iga}, title = {Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents}, booktitle = {{AICT}}, pages = {370--375}, publisher = {{IEEE} Computer Society}, year = {2010} }
@inproceedings{DBLP:conf/arc/Shoufan10, author = {Abdulhadi Shoufan}, title = {An {FPGA} Accelerator for Hash Tree Generation in the Merkle Signature Scheme}, booktitle = {{ARC}}, series = {Lecture Notes in Computer Science}, volume = {5992}, pages = {145--156}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/arcs/Fechner10, author = {Bernhard Fechner}, title = {GPU-Based Parallel Signature Scanning and Hash Generation}, booktitle = {{ARCS} Workshops}, pages = {133--138}, publisher = {{VDE} Verlag}, year = {2010} }
@inproceedings{DBLP:conf/icip/ChaisornSM10, author = {Lekha Chaisorn and Janya Sainui and Corey Manders}, title = {Fast and efficient video signature generation and matching for online video sharing}, booktitle = {{ICIP}}, pages = {2129--2132}, publisher = {{IEEE}}, year = {2010} }
@inproceedings{DBLP:conf/infocom/ZhangKP10, author = {Junxing Zhang and Sneha Kumar Kasera and Neal Patwari}, title = {Mobility Assisted Secret Key Generation Using Wireless Link Signatures}, booktitle = {{INFOCOM}}, pages = {261--265}, publisher = {{IEEE}}, year = {2010} }
@inproceedings{DBLP:conf/nsdi/PerdisciLF10, author = {Roberto Perdisci and Wenke Lee and Nick Feamster}, title = {Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces}, booktitle = {{NSDI}}, pages = {391--404}, publisher = {{USENIX} Association}, year = {2010} }
@inproceedings{DBLP:conf/pdcat/Tang10, author = {Xinyu Tang}, title = {The Generation of Attack Signatures Based on Virtual Honeypots}, booktitle = {{PDCAT}}, pages = {435--439}, publisher = {{IEEE} Computer Society}, year = {2010} }
@inproceedings{DBLP:conf/securecomm/KongJGZLX10, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection}, booktitle = {SecureComm}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {1--19}, publisher = {Springer}, year = {2010} }
@article{DBLP:journals/eswa/LuminiN09, author = {Alessandra Lumini and Loris Nanni}, title = {Ensemble of on-line signature matchers based on OverComplete feature generation}, journal = {Expert Syst. Appl.}, volume = {36}, number = {3}, pages = {5291--5296}, year = {2009} }
@inproceedings{DBLP:conf/acsac/LiJS09, author = {Lixin Li and James E. Just and R. Sekar}, title = {Online Signature Generation for Windows Systems}, booktitle = {{ACSAC}}, pages = {289--298}, publisher = {{IEEE} Computer Society}, year = {2009} }
@inproceedings{DBLP:conf/broadcom/MohammedCVHA09, author = {Mohssen Mohammed Zian Elaabdeen Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Ezzeldien Amin}, title = {Signature Generation for Zero-day Polymorphic Works}, booktitle = {BroadBandCom}, pages = {295--300}, publisher = {Wroc{\l}aw University of Technology}, year = {2009} }
@inproceedings{DBLP:conf/cis/YaoLZ09, author = {Li Yao and Yu Liu and Yuqing Zhang}, title = {An Integrated Approach to Worm Detection and Automatic Signature Generation}, booktitle = {{CIS} {(2)}}, pages = {371--375}, publisher = {{IEEE} Computer Society}, year = {2009} }
@inproceedings{DBLP:conf/csiirw/WyschogrodD09, author = {Daniel Wyschogrod and Jeffrey Dezso}, title = {Using automatic signature generation as a sensor backend}, booktitle = {{CSIIRW}}, pages = {29}, publisher = {{ACM}}, year = {2009} }
@inproceedings{DBLP:conf/depcos/Tylman09, author = {Wojciech Tylman}, title = {Data Mining Techniques for Semi-automatic Signature Generation}, booktitle = {DepCoS-RELCOMEX}, pages = {210--217}, publisher = {{IEEE} Computer Society}, year = {2009} }
@inproceedings{DBLP:conf/icc/WangWCZ09, author = {Jie Wang and Jianxin Wang and Jianer Chen and Xi Zhang}, title = {An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding}, booktitle = {{ICC}}, pages = {1--6}, publisher = {{IEEE}}, year = {2009} }
@inproceedings{DBLP:conf/raid/GriffinSHC09, author = {Kent Griffin and Scott Schneider and Xin Hu and Tzi{-}cker Chiueh}, title = {Automatic Generation of String Signatures for Malware Detection}, booktitle = {{RAID}}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {101--120}, publisher = {Springer}, year = {2009} }
@article{DBLP:journals/jsea/LiXYW08, author = {Nan Li and Chunhe Xia and Yi Yang and Haiquan Wang}, title = {An Algorithm for Generation of Attack Signatures Based on Sequences Alignment}, journal = {J. Softw. Eng. Appl.}, volume = {1}, number = {1}, pages = {76--82}, year = {2008} }
@article{DBLP:journals/tdsc/BrumleyNSWJ08, author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha}, title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {224--241}, year = {2008} }
@article{DBLP:journals/tissec/WangLCXRK08, author = {XiaoFeng Wang and Zhuowei Li and Jong Youl Choi and Jun Xu and Michael K. Reiter and Chongkyung Kil}, title = {Fast and Black-box Exploit Detection and Signature Generation for Commodity Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {11:1--11:35}, year = {2008} }
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08, author = {V. Sai Sathyanarayan and Pankaj Kohli and Bezawada Bruhadeshwar}, title = {Signature Generation and Detection of Malware Families}, booktitle = {{ACISP}}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {336--349}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/acsac/NandaC08, author = {Susanta Nanda and Tzi{-}cker Chiueh}, title = {Execution Trace-Driven Automated Attack Signature Generation}, booktitle = {{ACSAC}}, pages = {195--204}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/asap/BalasubramanianCBRD08, author = {Sundar Balasubramanian and Harold W. Carter and Andrey Bogdanov and Andy Rupp and Jintai Ding}, title = {Fast multivariate signature generation in hardware: The case of rainbow}, booktitle = {{ASAP}}, pages = {25--30}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/bliss/HoqueFH08, author = {Sanaul Hoque and Michael C. Fairhurst and W. Gareth J. Howells}, title = {Evaluating Biometric Encryption Key Generation Using Handwritten Signatures}, booktitle = {{BLISS}}, pages = {17--22}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/broadcom/MohammedC08, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan}, title = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet}, booktitle = {BroadCom}, pages = {142--147}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08, author = {Urko Zurutuza and Roberto Uribeetxeberria and Diego Zamboni}, title = {A data mining approach for analysis of worm activity through automatic signature generation}, booktitle = {AISec}, pages = {61--70}, publisher = {{ACM}}, year = {2008} }
@inproceedings{DBLP:conf/csse/LiXYW08, author = {Nan Li and Chunhe Xia and Yi Yang and Haiquan Wang}, title = {An Algorithm for Generation of Attack Signatures Based on Sequences Alignment}, booktitle = {{CSSE} {(3)}}, pages = {964--969}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/delta/DoulcierFR08, author = {M. Doulcier and Marie{-}Lise Flottes and Bruno Rouzeyre}, title = {AES-Based {BIST:} Self-Test, Test Pattern Generation and Signature Analysis}, booktitle = {{DELTA}}, pages = {314--321}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/dsn/LiWLR08, author = {Zhuowei Li and XiaoFeng Wang and Zhenkai Liang and Michael K. Reiter}, title = {{AGIS:} Towards automatic generation of infection signatures}, booktitle = {{DSN}}, pages = {237--246}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/fccm/BalasubramanianBRDC08, author = {Sundar Balasubramanian and Andrey Bogdanov and Andy Rupp and Jintai Ding and Harold W. Carter}, title = {Fast Multivariate Signature Generation in Hardware: The Case of Rainbow}, booktitle = {{FCCM}}, pages = {281--282}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/imsccs/YaoLGZY08, author = {Yu Yao and Junwei Lv and Fuxiang Gao and Yanfang Zhang and Ge Yu}, title = {Behavior-Based Worm Detection and Signature Generation}, booktitle = {{IMSCCS}}, pages = {124--131}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/ndss/VenkataramanBS08, author = {Shobha Venkataraman and Avrim Blum and Dawn Song}, title = {Limits of Learning-based Signature Generation with Adversaries}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2008} }
@inproceedings{DBLP:conf/noms/ParkWKH08, author = {Byung{-}Chul Park and Young J. Won and Myung{-}Sup Kim and James W. Hong}, title = {Towards automated application signature generation for traffic identification}, booktitle = {{NOMS}}, pages = {160--167}, publisher = {{IEEE}}, year = {2008} }
@inproceedings{DBLP:conf/waim/XiaoHCL08, author = {Fengtao Xiao and Huaping Hu and Xin Chen and Bo Liu}, title = {{ASG} Automated Signature Generation for Worm-Like {P2P} Traffic Patterns}, booktitle = {{WAIM}}, pages = {654--660}, publisher = {{IEEE} Computer Society}, year = {2008} }
@article{DBLP:journals/tdsc/CaiHPP07, author = {Min Cai and Kai Hwang and Jianping Pan and Christos Papadopoulos}, title = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {88--104}, year = {2007} }
@article{DBLP:journals/tdsc/HwangCCQ07, author = {Kai Hwang and Min Cai and Ying Chen and Min Qin}, title = {Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {41--55}, year = {2007} }
@inproceedings{DBLP:conf/acsac/GundyCSV07, author = {Matthew Van Gundy and Hao Chen and Zhendong Su and Giovanni Vigna}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {{ACSAC}}, pages = {74--85}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/faw/JoSL07, author = {Je{-}Gyeong Jo and Jong{-}Won Seo and Hyung{-}Woo Lee}, title = {Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint}, booktitle = {{FAW}}, series = {Lecture Notes in Computer Science}, volume = {4613}, pages = {38--49}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/icnp/LiWCF07, author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi Fu}, title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms}, booktitle = {{ICNP}}, pages = {164--173}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/iih-msp/TanakaSEY07, author = {Hideaki Tanaka and Shoichi Sasaki and Isao Echizen and Hiroshi Yoshiura}, title = {Secure Generation of Digital Signature on Compromised Computer}, booktitle = {{IIH-MSP}}, pages = {12--15}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/kesamsta/KimLK07a, author = {Sijung Kim and Geuk Lee and Bonghan Kim}, title = {The Design and Testing of Automated Signature Generation Engine for Worms Detection}, booktitle = {{KES-AMSTA}}, series = {Lecture Notes in Computer Science}, volume = {4496}, pages = {956--963}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/rcis/Nait-Sidi-MohWRG07, author = {Ahmed Nait{-}Sidi{-}Moh and Maxime Wack and Damien Rieupet and Jaafar Gaber}, title = {On an innovative generation method of electronic signatures: comparative study with traditional hash functions simulation}, booktitle = {{RCIS}}, pages = {357--360}, year = {2007} }
@inproceedings{DBLP:conf/acsac/WangJG06, author = {Hao Wang and Somesh Jha and Vinod Ganapathy}, title = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}}, booktitle = {{ACSAC}}, pages = {99--108}, publisher = {{IEEE} Computer Society}, year = {2006} }
@inproceedings{DBLP:conf/ccs/WangLXRKC06, author = {XiaoFeng Wang and Zhuowei Li and Jun Xu and Michael K. Reiter and Chongkyung Kil and Jong Youl Choi}, title = {Packet vaccine: black-box exploit detection and signature generation}, booktitle = {{CCS}}, pages = {37--46}, publisher = {{ACM}}, year = {2006} }
@inproceedings{DBLP:conf/eurosys/PortokalidisSB06, author = {Georgios Portokalidis and Asia Slowinska and Herbert Bos}, title = {Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation}, booktitle = {EuroSys}, pages = {15--27}, publisher = {{ACM}}, year = {2006} }
@inproceedings{DBLP:conf/icb/YipGNT06, author = {Wai Kuan Yip and Alwyn Goh and David Ngo Chek Ling and Andrew Teoh Beng Jin}, title = {Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures}, booktitle = {{ICB}}, series = {Lecture Notes in Computer Science}, volume = {3832}, pages = {509--515}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/mrcs/WahlHHI06, author = {Alain Wahl and Jean Hennebert and Andreas Humm and Rolf Ingold}, title = {Generation and Evaluation of Brute-Force Signature Forgeries}, booktitle = {{MRCS}}, series = {Lecture Notes in Computer Science}, volume = {4105}, pages = {2--9}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/raid/ChungM06, author = {Simon P. Chung and Aloysius K. Mok}, title = {Allergy Attack Against Automatic Signature Generation}, booktitle = {{RAID}}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {61--80}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06, author = {David Brumley and James Newsome and Dawn Xiaodong Song and Hao Wang and Somesh Jha}, title = {Towards Automatic Generation of Vulnerability-Based Signatures}, booktitle = {S{\&}P}, pages = {2--16}, publisher = {{IEEE} Computer Society}, year = {2006} }
@inproceedings{DBLP:conf/sp/LiSCKC06, author = {Zhichun Li and Manan Sanghi and Yan Chen and Ming{-}Yang Kao and Brian Chavez}, title = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience}, booktitle = {S{\&}P}, pages = {32--47}, publisher = {{IEEE} Computer Society}, year = {2006} }
@inproceedings{DBLP:conf/acsac/LiangS05, author = {Zhenkai Liang and R. Sekar}, title = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models}, booktitle = {{ACSAC}}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2005} }
@inproceedings{DBLP:conf/ccs/LiangS05, author = {Zhenkai Liang and R. Sekar}, title = {Fast and automated generation of attack signatures: a basis for building self-protecting servers}, booktitle = {{CCS}}, pages = {213--222}, publisher = {{ACM}}, year = {2005} }
@inproceedings{DBLP:conf/icc/DyerN05, author = {Justin S. Dyer and Balasubramaniam Natarajan}, title = {A new deterministic algorithm for {DS-CDMA} signature sequence generation}, booktitle = {{ICC}}, pages = {2348--2351}, publisher = {{IEEE}}, year = {2005} }
@inproceedings{DBLP:conf/ism/SimkhadaTWN05, author = {Kumar Simkhada and Hiroshi Tsunoda and Yuji Waizumi and Yoshiaki Nemoto}, title = {Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures}, booktitle = {{ISM}}, pages = {680--685}, publisher = {{IEEE} Computer Society}, year = {2005} }
@inproceedings{DBLP:conf/raid/WangCS05, author = {Ke Wang and Gabriela F. Cretu and Salvatore J. Stolfo}, title = {Anomalous Payload-Based Worm Detection and Signature Generation}, booktitle = {{RAID}}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {227--246}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/securecomm/TangCR05, author = {Caimu Tang and Anthony T. Chronopoulos and Cauligi S. Raghavendra}, title = {Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices}, booktitle = {SecureComm}, pages = {353--364}, publisher = {{IEEE}}, year = {2005} }
@inproceedings{DBLP:conf/sp/RubinJM05, author = {Shai Rubin and Somesh Jha and Barton P. Miller}, title = {Language-Based Generation and Evaluation of {NIDS} Signatures}, booktitle = {S{\&}P}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2005} }
@article{DBLP:journals/iam/GuptaTM04, author = {Alok Gupta and Y. Alex Tung and James R. Marsden}, title = {Digital signature: use and modification to achieve success in next generational e-business processes}, journal = {Inf. Manag.}, volume = {41}, number = {5}, pages = {561--575}, year = {2004} }
@article{DBLP:journals/ieicet/SameshimaSOM04, author = {Yoshiki Sameshima and Hideaki Saisho and Kazuko Oyanagi and Tsutomu Matsumoto}, title = {Multiparty {DSA} Signature Generation without Simultaneous User Operations}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {87-D}, number = {8}, pages = {2095--2105}, year = {2004} }
@article{DBLP:journals/ijisec/MacKenzieR04, author = {Philip D. MacKenzie and Michael K. Reiter}, title = {Two-party generation of {DSA} signatures}, journal = {Int. J. Inf. Sec.}, volume = {2}, number = {3-4}, pages = {218--239}, year = {2004} }
@inproceedings{DBLP:conf/iccsa/KwonL04, author = {Taekyoung Kwon and Jaeil Lee}, title = {Practical Digital Signature Generation Using Biometrics}, booktitle = {{ICCSA} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {728--737}, publisher = {Springer}, year = {2004} }
@article{DBLP:journals/corr/cs-CR-0409014, author = {Manoj Kumar}, title = {A Digital Signature with Threshold Generation and Verification}, journal = {CoRR}, volume = {cs.CR/0409014}, year = {2004} }
@article{DBLP:journals/bioinformatics/SadowskiP03, author = {Michael I. Sadowski and John Howard Parish}, title = {Automated generation and refinement of protein signatures: case study with G-protein coupled receptors}, journal = {Bioinform.}, volume = {19}, number = {6}, pages = {727--734}, year = {2003} }
@inproceedings{DBLP:conf/cdc/YoussefA03, author = {Bilal Youssef and Mazen Alamir}, title = {Generic signature generation tool for diagnosis and parametric estimation of multi-variable dynamical nonlinear systems}, booktitle = {{CDC}}, pages = {966--971}, publisher = {{IEEE}}, year = {2003} }
@article{DBLP:journals/imcs/FengW02, author = {Feng Hao and Chan Choong Wah}, title = {Private key generation from on-line handwritten signatures}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {159--164}, year = {2002} }
@inproceedings{DBLP:conf/crypto/MacKenzieR01, author = {Philip D. MacKenzie and Michael K. Reiter}, title = {Two-Party Generation of {DSA} Signatures}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {137--154}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/ctrsa/Huhnlein01, author = {Detlef H{\"{u}}hnlein}, title = {Faster Generation of NICE-Schnorr-Type Signatures}, booktitle = {{CT-RSA}}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {1--12}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/indocrypt/Ramesh01, author = {D. Ramesh}, title = {A Twin Algorithm for Efficient Generation of Digital Signatures}, booktitle = {{INDOCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {267--274}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/iwvf/Nishida01, author = {Hirobumi Nishida}, title = {Robust Structural Indexing through Quasi-Invariant Shape Signatures and Feature Generation}, booktitle = {{IWVF}}, series = {Lecture Notes in Computer Science}, volume = {2059}, pages = {696--705}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/pkc/JakobssonW01, author = {Markus Jakobsson and Susanne Wetzel}, title = {Secure Server-Aided Signature Generation}, booktitle = {Public Key Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {383--401}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/ats/ShiehLS00, author = {Ming{-}Der Shieh and Hsin{-}Fu Lo and Ming{-}Hwa Sheu}, title = {High-speed generation of {LFSR} signatures}, booktitle = {Asian Test Symposium}, pages = {222}, publisher = {{IEEE} Computer Society}, year = {2000} }
@inproceedings{DBLP:conf/icassp/YarmanA00, author = {B. Siddik Yarman and Rafet Akdeniz}, title = {Generation of optimum signature base sequences for speech signals}, booktitle = {{ICASSP}}, pages = {1077--1080}, publisher = {{IEEE}}, year = {2000} }
@inproceedings{DBLP:conf/edcc/Echtle99, author = {Klaus Echtle}, title = {Avoiding Malicious Byzantine Faults by a New Signature Generation Technique}, booktitle = {{EDCC}}, series = {Lecture Notes in Computer Science}, volume = {1667}, pages = {106--123}, publisher = {Springer}, year = {1999} }
@article{DBLP:journals/vldb/ChakrabartiDAR98, author = {Soumen Chakrabarti and Byron Dom and Rakesh Agrawal and Prabhakar Raghavan}, title = {Scalable Feature Selection, Classification and Signature Generation for Organizing Large Text Databases into Hierarchical Topic Taxonomies}, journal = {{VLDB} J.}, volume = {7}, number = {3}, pages = {163--178}, year = {1998} }
@inproceedings{DBLP:conf/eurocrypt/PoupardS98, author = {Guillaume Poupard and Jacques Stern}, title = {Security Analysis of a Practical "on the fly" Authentication and Signature Generation}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {422--436}, publisher = {Springer}, year = {1998} }
@inproceedings{DBLP:conf/eusipco/KinoshitaS98, author = {Hirotsugu Kinoshita and Masafumi Satoh}, title = {Generation of the signature with the structured information of the image}, booktitle = {{EUSIPCO}}, pages = {1--4}, publisher = {{IEEE}}, year = {1998} }
@inproceedings{DBLP:conf/bsdia/OliveiraKBS97, author = {Claudio de Oliveira and Celso A. A. Kaestner and Fl{\'{a}}vio Bortolozzi and Robert Sabourin}, title = {Generation of Signatures by Deformations}, booktitle = {{BSDIA}}, series = {Lecture Notes in Computer Science}, volume = {1339}, pages = {283--298}, publisher = {Springer}, year = {1997} }
@inproceedings{DBLP:conf/spieSR/CelentanoL97, author = {Augusto Celentano and Vincenzo Di Lecce}, title = {FFT-Based Technique for Image-Signature Generation}, booktitle = {Storage and Retrieval for Image and Video Databases {(SPIE)}}, series = {{SPIE} Proceedings}, volume = {3022}, pages = {457--466}, publisher = {{SPIE}}, year = {1997} }
@inproceedings{DBLP:conf/ccs/MRaihiN96, author = {David M'Ra{\"{\i}}hi and David Naccache}, title = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy}, booktitle = {{CCS}}, pages = {58--61}, publisher = {{ACM}}, year = {1996} }
@inproceedings{DBLP:conf/crypto/CramesD96, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {New Generation of Secure and Practical RSA-Based Signatures}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {173--185}, publisher = {Springer}, year = {1996} }
@inproceedings{DBLP:conf/acm/YoungL94, author = {Hwan{-}Seung Yong and Sukho Lee}, title = {Signature File Generation Techniques for Query Processing in Object-Oriented Databases}, booktitle = {{ACM} Conference on Computer Science}, pages = {364--371}, publisher = {{ACM}}, year = {1994} }
@article{DBLP:journals/tods/LengL92, author = {Chun{-}Wu Roger Leng and Dik Lun Lee}, title = {Optimal Weight Assignment for Signature Generation}, journal = {{ACM} Trans. Database Syst.}, volume = {17}, number = {2}, pages = {346--373}, year = {1992} }
@article{DBLP:journals/joc/Schnorr91, author = {Claus{-}Peter Schnorr}, title = {Efficient Signature Generation by Smart Cards}, journal = {J. Cryptol.}, volume = {4}, number = {3}, pages = {161--174}, year = {1991} }
@inproceedings{DBLP:conf/crypto/DesmedtF91, author = {Yvo Desmedt and Yair Frankel}, title = {Shared Generation of Authenticators and Signatures (Extended Abstract)}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {457--469}, publisher = {Springer}, year = {1991} }
@inproceedings{DBLP:conf/eurocrypt/OngS90, author = {H. Ong and Claus{-}Peter Schnorr}, title = {Fast Signature Generation With a Fiat Shamir-Like Scheme}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {432--440}, publisher = {Springer}, year = {1990} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.