Search dblp for Publications

export results for "signature generation"

 download as .bib file

@article{DBLP:journals/mta/PandeyBS24,
  author       = {Sachi Pandey and
                  Ritin Behl and
                  Amit Sinha},
  title        = {Decentralized blockchain-based security enhancement with lamport merkle
                  digital signature generation and optimized encryption in cloud environment},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {16},
  pages        = {47269--47293},
  year         = {2024}
}
@article{DBLP:journals/cbm/LazebnikK23,
  author       = {Teddy Lazebnik and
                  Liron Simon Keren},
  title        = {Cancer-inspired genomics mapper model for the generation of synthetic
                  {DNA} sequences with desired genomics signatures},
  journal      = {Comput. Biol. Medicine},
  volume       = {164},
  pages        = {107221},
  year         = {2023}
}
@article{DBLP:journals/eswa/ArabNC23,
  author       = {Naouel Arab and
                  Hassiba Nemmour and
                  Youcef Chibani},
  title        = {A new synthetic feature generation scheme based on artificial immune
                  systems for robust offline signature verification},
  journal      = {Expert Syst. Appl.},
  volume       = {213},
  number       = {Part},
  pages        = {119306},
  year         = {2023}
}
@article{DBLP:journals/jip/KobayashiKKO23,
  author       = {Masaki Kobayashi and
                  Yo Kanemoto and
                  Daisuke Kotani and
                  Yasuo Okabe},
  title        = {Generation of {IDS} Signatures through Exhaustive Execution Path Exploration
                  in PoC Codes for Vulnerabilities},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {591--601},
  year         = {2023}
}
@article{DBLP:journals/sensors/SimESYKS23,
  author       = {Minjoo Sim and
                  Siwoo Eum and
                  Gyeongju Song and
                  Yujin Yang and
                  Wonwoong Kim and
                  Hwajeong Seo},
  title        = {{K-XMSS} and {K-SPHINCS+:} Enhancing Security in Next-Generation Mobile
                  Communication and Internet Systems with Hash Based Signatures Using
                  Korean Cryptography Algorithms},
  journal      = {Sensors},
  volume       = {23},
  number       = {17},
  pages        = {7558},
  year         = {2023}
}
@inproceedings{DBLP:conf/africacrypt/NguyenG23,
  author       = {Duc Tri Nguyen and
                  Kris Gaj},
  title        = {Fast Falcon Signature Generation and Verification Using ARMv8 {NEON}
                  Instructions},
  booktitle    = {{AFRICACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14064},
  pages        = {417--441},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/eicc/RomeroMAARV23,
  author       = {Agust{\'{\i}}n Walabonso Lara Romero and
                  Juan Antonio Ternero Mu{\~{n}}iz and
                  Rafael M. Estepa{-}Alonso and
                  Antonio Jose Estepa Alonso and
                  Fernando Ruiz Robles and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo},
  title        = {{HTTP} Cyberattacks Detection through Automatic Signature Generation
                  in multi-site IoT Deployments},
  booktitle    = {{EICC}},
  pages        = {65--70},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/ihci/KumarSRS23,
  author       = {Suneel Kumar and
                  Mona Singh and
                  Ruchilekha and
                  Manoj Kumar Singh},
  title        = {Semantic Segmentation Based Image Signature Generation for {CBIR}},
  booktitle    = {{IHCI} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14532},
  pages        = {319--329},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/irps/MalikJCMKSBVS23,
  author       = {Rasik Rashid Malik and
                  Vipin Joshi and
                  Rajarshi Roy Chaudhuri and
                  Mehak Ashraf Mir and
                  Zubear Khan and
                  Avinas N. Shaji and
                  Madhura Bhattacharya and
                  Anup T. Vitthal and
                  Mayank Shrivastava},
  title        = {Signatures of Positive Gate Over-Drive Induced Hole Trap Generation
                  and its Impact on p-GaN Gate Stack Instability in AlGaN/GaN HEMTs},
  booktitle    = {{IRPS}},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/mwscas/SenC23,
  author       = {Ovishake Sen and
                  Baibhab Chatterjee},
  title        = {Invited: Ring-Oscillator Physical Unclonable Function {(RO-PUF)} Based
                  {PRBS} Generation as a Device Signature in Distributed Brain Implants},
  booktitle    = {{MWSCAS}},
  pages        = {439--443},
  publisher    = {{IEEE}},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2301-01315,
  author       = {Pere D{\'{\i}}az Lozano and
                  Toni Lozano Bag{\'{e}}n and
                  Josep Vives},
  title        = {Neural SDEs for Conditional Time Series Generation and the Signature-Wasserstein-1
                  metric},
  journal      = {CoRR},
  volume       = {abs/2301.01315},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2305-01475,
  author       = {Teddy Lazebnik and
                  Liron Simon Keren},
  title        = {Cancer-inspired Genomics Mapper Model for the Generation of Synthetic
                  {DNA} Sequences with Desired Genomics Signatures},
  journal      = {CoRR},
  volume       = {abs/2305.01475},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2305-05775,
  author       = {Ovishake Sen and
                  Baibhab Chatterjee},
  title        = {Modified Ring-Oscillator Physical Unclonable Function {(RO-PUF)} based
                  {PRBS} Generation as a Device Signature in Distributed Brain Implants},
  journal      = {CoRR},
  volume       = {abs/2305.05775},
  year         = {2023}
}
@article{DBLP:journals/jetc/ThompsonW22,
  author       = {David Thompson and
                  Haibo Wang},
  title        = {Integrated Power Signature Generation Circuit for IoT Abnormality
                  Detection},
  journal      = {{ACM} J. Emerg. Technol. Comput. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {5:1--5:13},
  year         = {2022}
}
@inproceedings{DBLP:conf/coolchips/MasadaNI22,
  author       = {Kaoru Masada and
                  Ryohei Nakayama and
                  Makoto Ikeda},
  title        = {Hardware Acceleration of Aggregate Signature Generation and Authentication
                  by {BLS} Signature over {BLS12-381} curve},
  booktitle    = {{COOL} {CHIPS}},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icpr/ShiWL22,
  author       = {Zhixin Shi and
                  Xiangyu Wang and
                  Pengcheng Liu},
  title        = {{NBP-MS:} Malware Signature Generation Based on Network Behavior Profiling},
  booktitle    = {{ICPR}},
  pages        = {1865--1870},
  publisher    = {{IEEE}},
  year         = {2022}
}
@article{DBLP:journals/mta/ChandrasekaranT21,
  author       = {Lakshmi Chandrasekaran and
                  Karuppuswamy Thenmozhi and
                  John Bosco Balaguru Rayappan and
                  Rengarajan Amirtharajan},
  title        = {Genetic and chaotic signatures in offspring - an encrypted generation
                  of image family},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {6},
  pages        = {8581--8609},
  year         = {2021}
}
@inproceedings{DBLP:conf/cikm/DuHH21,
  author       = {Min Du and
                  Wenjun Hu and
                  William Hewlett},
  title        = {AutoCombo: Automatic Malware Signature Generation Through Combination
                  Rule Mining},
  booktitle    = {{CIKM}},
  pages        = {3777--3786},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/icmc2/Ikematsu21,
  author       = {Yasuhiko Ikematsu},
  title        = {A Study on Randomness Used in Signature Generation of {UOV}},
  booktitle    = {{ICMC}},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1412},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/igarss/AlnujaimK21,
  author       = {Ibrahim Alnujaim and
                  Youngwook Kim},
  title        = {Application of Conditional Generative Adversarial Networks for Generation
                  of Micro-Doppler Signatures of Different Aspect Angles},
  booktitle    = {{IGARSS}},
  pages        = {5056--5058},
  publisher    = {{IEEE}},
  year         = {2021}
}
@inproceedings{DBLP:conf/iscas/SongHWTW21,
  author       = {Yifeng Song and
                  Xiao Hu and
                  Wenhao Wang and
                  Jing Tian and
                  Zhongfeng Wang},
  title        = {High-Speed and Scalable {FPGA} Implementation of the Key Generation
                  for the Leighton-Micali Signature Protocol},
  booktitle    = {{ISCAS}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021}
}
@inproceedings{DBLP:conf/nca/KapoorFQ21,
  author       = {Maya Kapoor and
                  Garrett Fuchs and
                  Jonathan Quance},
  title        = {RExACtor: Automatic Regular Expression Signature Generation for Stateless
                  Packet Inspection},
  booktitle    = {{NCA}},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021}
}
@inproceedings{DBLP:conf/sacrypt/KosugeT21,
  author       = {Haruhisa Kosuge and
                  Hidema Tanaka},
  title        = {Simple and Memory-Efficient Signature Generation of {\textdollar}{\textbackslash}mathrm
                  \{XMSS\{MT\}\}{\textdollar}},
  booktitle    = {{SAC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13203},
  pages        = {377--397},
  publisher    = {Springer},
  year         = {2021}
}
@article{DBLP:journals/iet-ifs/FengHWWH20,
  author       = {Qi Feng and
                  Debiao He and
                  Huaqun Wang and
                  Ding Wang and
                  Xinyi Huang},
  title        = {Multi-party key generation protocol for the identity-based signature
                  scheme in the {IEEE} {P1363} standard for public key cryptography},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {724--732},
  year         = {2020}
}
@article{DBLP:journals/ijcat/ShinRIY20,
  author       = {Jungpil Shin and
                  Md. Abdur Rahim and
                  Md. Rashedul Islam and
                  Keun Soo Yun},
  title        = {A novel approach of cursive signature generation for personal identity},
  journal      = {Int. J. Comput. Appl. Technol.},
  volume       = {62},
  number       = {4},
  pages        = {384--394},
  year         = {2020}
}
@article{DBLP:journals/ijgi/ChenHLAH20,
  author       = {Ting Chen and
                  Haiqing He and
                  Dajun Li and
                  Puyang An and
                  Zhenyang Hui},
  title        = {Damage Signature Generation of Revetment Surface along Urban Rivers
                  Using UAV-Based Mapping},
  journal      = {{ISPRS} Int. J. Geo Inf.},
  volume       = {9},
  number       = {4},
  pages        = {283},
  year         = {2020}
}
@article{DBLP:journals/ijon/RuizLSV20,
  author       = {Victoria Ru{\'{\i}}z and
                  Ismael Linares and
                  {\'{A}}ngel S{\'{a}}nchez and
                  Jos{\'{e}} Francisco V{\'{e}}lez},
  title        = {Off-line handwritten signature verification using compositional synthetic
                  generation of signatures and Siamese Neural Networks},
  journal      = {Neurocomputing},
  volume       = {374},
  pages        = {30--41},
  year         = {2020}
}
@article{DBLP:journals/jaiscr/ZalasinskiCLWP20,
  author       = {Marcin Zalasinski and
                  Krzysztof Cpalka and
                  Lukasz Laskowski and
                  Donald C. Wunsch and
                  Krzysztof Przybyszewski},
  title        = {An Algorithm for the Evolutionary-Fuzzy Generation of on-Line Signature
                  Hybrid Descriptors},
  journal      = {J. Artif. Intell. Soft Comput. Res.},
  volume       = {10},
  number       = {3},
  pages        = {173--187},
  year         = {2020}
}
@article{DBLP:journals/nar/StathiasTKVCFPT20,
  author       = {Vasileios Stathias and
                  John Paul Turner and
                  Amar Koleti and
                  Dusica Vidovic and
                  Daniel J. Cooper and
                  Mehdi Fazel{-}Najafabadi and
                  Marcin Pilarczyk and
                  Raymond Terryn and
                  Caty Chung and
                  Afoma Umeano and
                  Daniel J. B. Clarke and
                  Alexander Lachmann and
                  John Erol Evangelista and
                  Avi Ma'ayan and
                  Mario Medvedovic and
                  Stephan C. Sch{\"{u}}rer},
  title        = {{LINCS} Data Portal 2.0: next generation access point for perturbation-response
                  signatures},
  journal      = {Nucleic Acids Res.},
  volume       = {48},
  number       = {Database-Issue},
  pages        = {D431--D439},
  year         = {2020}
}
@article{DBLP:journals/nca/KaurS20,
  author       = {Sanmeet Kaur and
                  Maninder Singh},
  title        = {Hybrid intrusion detection and signature generation using Deep Recurrent
                  Neural Networks},
  journal      = {Neural Comput. Appl.},
  volume       = {32},
  number       = {12},
  pages        = {7859--7877},
  year         = {2020}
}
@article{DBLP:journals/nn/NahmiasCNE20,
  author       = {Daniel Nahmias and
                  Aviad Cohen and
                  Nir Nissim and
                  Yuval Elovici},
  title        = {Deep feature transfer learning for trusted and automated malware signature
                  generation in private cloud environments},
  journal      = {Neural Networks},
  volume       = {124},
  pages        = {243--257},
  year         = {2020}
}
@article{DBLP:journals/tcs/KimLH20,
  author       = {Gyu{-}Chol Kim and
                  Su{-}Chol Li and
                  Hak{-}Chol Hwang},
  title        = {Fast rebalanced {RSA} signature scheme with typical prime generation},
  journal      = {Theor. Comput. Sci.},
  volume       = {830-831},
  pages        = {1--19},
  year         = {2020}
}
@inproceedings{DBLP:conf/bmei/ZitarNHA20,
  author       = {Raed Abu Zitar and
                  Mirna Nachouki and
                  Hanan Hussain and
                  Farid Alzboun},
  title        = {Recurrent Neural Networks for Signature Generation},
  booktitle    = {{CISP-BMEI}},
  pages        = {1093--1097},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/ccoms/LongX20,
  author       = {Yihong Long and
                  Feng Xiong},
  title        = {Collaborative Generations Of Sm9 Private Key And Digital Signature
                  Using Homomorphic Encryption},
  booktitle    = {{ICCCS}},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/ccs/Kokoris-KogiasM20,
  author       = {Eleftherios Kokoris{-}Kogias and
                  Dahlia Malkhi and
                  Alexander Spiegelman},
  title        = {Asynchronous Distributed Key Generation for Computationally-Secure
                  Randomness, Consensus, and Threshold Signatures},
  booktitle    = {{CCS}},
  pages        = {1751--1767},
  publisher    = {{ACM}},
  year         = {2020}
}
@inproceedings{DBLP:conf/emnlp/WeirSD20,
  author       = {Nathaniel Weir and
                  Jo{\~{a}}o Sedoc and
                  Benjamin Van Durme},
  title        = {{COD3S:} Diverse Generation with Discrete Semantic Signatures},
  booktitle    = {{EMNLP} {(1)}},
  pages        = {5199--5211},
  publisher    = {Association for Computational Linguistics},
  year         = {2020}
}
@inproceedings{DBLP:conf/ewdts/ChesnokovKCSCP20,
  author       = {Nikita I. Chesnokov and
                  Denis A. Korochentsev and
                  Larissa V. Cherckesova and
                  Olga A. Safaryan and
                  Vladislav E. Chumakov and
                  Irina A. Pilipenko},
  title        = {Software Development of Electronic Digital Signature Generation at
                  Institution Electronic Document Circulation},
  booktitle    = {{EWDTS}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/iccsp/LongX20,
  author       = {Yihong Long and
                  Feng Xiong},
  title        = {Secret Sharing Based {BLMQ} Signature Generation},
  booktitle    = {{ICCSP}},
  pages        = {6--12},
  publisher    = {{ACM}},
  year         = {2020}
}
@inproceedings{DBLP:conf/icct/YeL20,
  author       = {Wenlan Ye and
                  Yihong Long},
  title        = {Two Party Generation of {SM9} Digital Signature},
  booktitle    = {{ICCT}},
  pages        = {1556--1560},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/mwscas/ThompsonSW20,
  author       = {David E. Thompson and
                  Md Kamruzzaman Shuvo and
                  Haibo Wang},
  title        = {Digital {LDO} Based Power Signature Generation Circuit for IoT Security},
  booktitle    = {{MWSCAS}},
  pages        = {1076--1079},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/provsec/KajitaONT20,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  title        = {Short Lattice Signatures in the Standard Model with Efficient Tag
                  Generation},
  booktitle    = {ProvSec},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/trustcom/FengHLLC20,
  author       = {Qi Feng and
                  Debiao He and
                  Min Luo and
                  Zengxiang Li and
                  Kim{-}Kwang Raymond Choo},
  title        = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection
                  and Applications in Cryptocurrency},
  booktitle    = {TrustCom},
  pages        = {137--147},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/trustcom/ZhangTCXLX20,
  author       = {Runzi Zhang and
                  Mingkai Tong and
                  Lei Chen and
                  Jianxin Xue and
                  Wenmao Liu and
                  Feng Xie},
  title        = {CMIRGen: Automatic Signature Generation Algorithm for Malicious Network
                  Traffic},
  booktitle    = {TrustCom},
  pages        = {736--743},
  publisher    = {{IEEE}},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2010-02882,
  author       = {Nathaniel Weir and
                  Jo{\~{a}}o Sedoc and
                  Benjamin Van Durme},
  title        = {{COD3S:} Diverse Generation with Discrete Semantic Signatures},
  journal      = {CoRR},
  volume       = {abs/2010.02882},
  year         = {2020}
}
@article{DBLP:journals/eecs/JagadeeshDBR19,
  author       = {Kokila Jagadeesh and
                  Arjun Murali Das and
                  B. Shameedha Begum and
                  Natarajan Ramasubramanian},
  title        = {Hardware Signature Generation Using a Hybrid {PUF} and {FSM} Model
                  for an SoC Architecture},
  journal      = {Period. Polytech. Electr. Eng. Comput. Sci.},
  volume       = {63},
  number       = {4},
  pages        = {244--253},
  year         = {2019}
}
@article{DBLP:journals/ieicet/ItoK19,
  author       = {Hiroshi Ito and
                  Tadashi Kasezawa},
  title        = {Permutation-Based Signature Generation for Spread-Spectrum Video Watermarking},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {1},
  pages        = {31--40},
  year         = {2019}
}
@article{DBLP:journals/iotj/ChangLLGP19,
  author       = {Chin{-}Chen Chang and
                  Wai{-}Kong Lee and
                  Yanjun Liu and
                  Bok{-}Min Goi and
                  Raphael C.{-}W. Phan},
  title        = {Signature Gateway: Offloading Signature Generation to IoT Gateway
                  Accelerated by {GPU}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4448--4461},
  year         = {2019}
}
@article{DBLP:journals/jise/ZhaoYZ19,
  author       = {Pu Zhao and
                  Jia Yu and
                  Hanlin Zhang},
  title        = {Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving
                  Public Cloud Storage Auditing},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {35},
  number       = {3},
  pages        = {635--650},
  year         = {2019}
}
@article{DBLP:journals/js/BaeKA19,
  author       = {Tae{-}Wuk Bae and
                  Young{-}Choon Kim and
                  Sang{-}Ho Ahn},
  title        = {{IR} Composite Image Generation by Wavelength Band Based on Temperature
                  Synthesis Estimated from {IR} Target Signature and Background Scene},
  journal      = {J. Sensors},
  volume       = {2019},
  pages        = {9423976:1--9423976:17},
  year         = {2019}
}
@inproceedings{DBLP:conf/ats/HiramotoOT19,
  author       = {Yushiro Hiramoto and
                  Satoshi Ohtake and
                  Hiroshi Takahashi},
  title        = {A Built-In Self-Diagnostic Mechanism for Delay Faults Based on Self-Generation
                  of Expected Signatures},
  booktitle    = {{ATS}},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/cis/LongC19,
  author       = {Yihong Long and
                  Minyang Cheng},
  title        = {Secret Sharing Based {SM2} Digital Signature Generation using Homomorphic
                  Encryption},
  booktitle    = {{CIS}},
  pages        = {252--256},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/cis/ShanYGJWL19,
  author       = {Weijun Shan and
                  Jun Yu and
                  Limin Guo and
                  Kun Jiang and
                  Lihui Wang and
                  Qing Li},
  title        = {A Horizontal Attack on {SM9} Signature Generation},
  booktitle    = {{CIS}},
  pages        = {306--309},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/eurosp/Zhdanov19,
  author       = {Alexander Zhdanov},
  title        = {Generation of Static YARA-Signatures Using Genetic Algorithm},
  booktitle    = {EuroS{\&}P Workshops},
  pages        = {220--228},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/fnss/QiuLW19,
  author       = {Jian Qiu and
                  Hengjian Li and
                  Xiyu Wang},
  title        = {Cancelable Palmprint Feature Generation Method Based on Minimum Signature},
  booktitle    = {{FNSS}},
  series       = {Communications in Computer and Information Science},
  volume       = {1113},
  pages        = {118--127},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/icaiic/ChoiKPC19,
  author       = {Kiho Choi and
                  Hyeongrae Kim and
                  Daejin Park and
                  Jeonghun Cho},
  title        = {Automatic Multi-Thread Code Generation for Monitoring Signature-based
                  Control Flow},
  booktitle    = {{ICAIIC}},
  pages        = {28--33},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/icbk/ZhangHHCT19,
  author       = {Yuanming Zhang and
                  Ting Han and
                  Zelin Hao and
                  Yu Cao and
                  Jing Tao},
  title        = {An Efficient Application Traffic Signature Generation System},
  booktitle    = {{ICBK}},
  pages        = {341--347},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/ijcnn/NahmiasCNE19,
  author       = {Daniel Nahmias and
                  Aviad Cohen and
                  Nir Nissim and
                  Yuval Elovici},
  title        = {TrustSign: Trusted Malware Signature Generation in Private Clouds
                  Using Deep Feature Transfer Learning},
  booktitle    = {{IJCNN}},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1905-00154,
  author       = {Saeed Valizadeh and
                  Marten van Dijk},
  title        = {On the Convergence Rates of Learning-based Signature Generation Schemes
                  to Contain Self-propagating Malware},
  journal      = {CoRR},
  volume       = {abs/1905.00154},
  year         = {2019}
}
@article{DBLP:journals/access/AtzeniDMSST18,
  author       = {Andrea S. Atzeni and
                  Fernando Diaz and
                  Andrea Marcelli and
                  Antonio S{\'{a}}nchez and
                  Giovanni Squillero and
                  Alberto Paolo Tonda},
  title        = {Countering Android Malware: {A} Scalable Semi-Supervised Approach
                  for Family-Signature Generation},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {59540--59556},
  year         = {2018}
}
@article{DBLP:journals/ejwcn/YiN18,
  author       = {Haibo Yi and
                  Zhe Nie},
  title        = {High-speed hardware architecture for implementations of multivariate
                  signature generations on FPGAs},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2018},
  pages        = {93},
  year         = {2018}
}
@article{DBLP:journals/ieicet/SugiyamaAI18,
  author       = {Shotaro Sugiyama and
                  Hiromitsu Awano and
                  Makoto Ikeda},
  title        = {Low Latency 256-bit {\textdollar}mathbb\{F\}{\_}p{\textdollar} {ECDSA}
                  Signature Generation Crypto Processor},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {12},
  pages        = {2290--2296},
  year         = {2018}
}
@article{DBLP:journals/itiis/PengT18,
  author       = {Zhiniang Peng and
                  Shaohua Tang},
  title        = {Circulant {UOV:} a new {UOV} variant with shorter private key and
                  faster signature generation},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {1376--1395},
  year         = {2018}
}
@article{DBLP:journals/itiis/SijaSK18,
  author       = {Baraka D. Sija and
                  Kyu{-}Seok Shim and
                  Myung{-}Sup Kim},
  title        = {Automatic Payload Signature Generation for Accurate Identification
                  of Internet Applications and Application Services},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {4},
  pages        = {1572--1593},
  year         = {2018}
}
@article{DBLP:journals/jihmsp/MengT18,
  author       = {Lei Meng and
                  Lin Teng},
  title        = {Karhunen Loeve Transform-based Online Handwritten Signature Scheme
                  via Dynamic Bit Allocation Method and Naive Bayes for Biometric Key
                  Generation},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {9},
  number       = {4},
  pages        = {896--903},
  year         = {2018}
}
@article{DBLP:journals/jwe/TangLC18,
  author       = {Yazhe Tang and
                  Xun Li and
                  Lishui Chen},
  title        = {{STAFF:} Automated Signature Generationfor Fine-Grained FunctionTraffic
                  Identification},
  journal      = {J. Web Eng.},
  volume       = {17},
  number       = {5},
  pages        = {71--94},
  year         = {2018}
}
@article{DBLP:journals/tdsc/LeeKLCYLL18,
  author       = {Suchul Lee and
                  Sungho Kim and
                  Sungil Lee and
                  Jaehyuk Choi and
                  Hanjun Yoon and
                  Dohoon Lee and
                  Jun{-}Rak Lee},
  title        = {LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet
                  Allocation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {771--783},
  year         = {2018}
}
@inproceedings{DBLP:conf/asscc/SugiyamaAI18,
  author       = {Shotaro Sugiyama and
                  Hiromitsu Awano and
                  Makoto Ikeda},
  title        = {31.3 {\(\mu\)}s/Signature-Generation 256-bit {\unicode{54589}}p {ECDSA}
                  Cryptoprocessor},
  booktitle    = {{A-SSCC}},
  pages        = {153--156},
  publisher    = {{IEEE}},
  year         = {2018}
}
@inproceedings{DBLP:conf/cns/AlhanahnahLYZC18,
  author       = {Mohannad Alhanahnah and
                  Qicheng Lin and
                  Qiben Yan and
                  Ning Zhang and
                  Zhenxiang Chen},
  title        = {Efficient Signature Generation for Classifying Cross-Architecture
                  IoT Malware},
  booktitle    = {{CNS}},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018}
}
@inproceedings{DBLP:conf/igarss/OzdilEDO18,
  author       = {Omer Ozdil and
                  Yunus Emre Esin and
                  Berkan Demirel and
                  Safak Ozturk},
  title        = {Representative Signature Generation for Plant Detection in Hyperspectral
                  Images},
  booktitle    = {{IGARSS}},
  pages        = {2709--2712},
  publisher    = {{IEEE}},
  year         = {2018}
}
@inproceedings{DBLP:conf/iseaisap/NaderiVCPA18,
  author       = {Hassan Naderi and
                  P. Vinod and
                  Mauro Conti and
                  Saeed Parsa and
                  Mohammad Hadi Alaeiyan},
  title        = {Malware Signature Generation Using Locality Sensitive Hashing},
  booktitle    = {{ISEA-ISAP}},
  series       = {Communications in Computer and Information Science},
  volume       = {939},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {2018}
}
@article{DBLP:journals/access/PengT17,
  author       = {Zhiniang Peng and
                  Shaohua Tang},
  title        = {Circulant Rainbow: {A} New Rainbow Variant With Shorter Private Key
                  and Faster Signature Generation},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {11877--11886},
  year         = {2017}
}
@article{DBLP:journals/jise/ShimYLK17,
  author       = {Kyu{-}Seok Shim and
                  Sung{-}Ho Yoon and
                  Su{-}Kang Lee and
                  Myung{-}Sup Kim},
  title        = {SigBox: Automatic Signature Generation Method for Fine-grained Traffic
                  Identification},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {2},
  pages        = {537--569},
  year         = {2017}
}
@article{DBLP:journals/jocs/Niewiadomska-Szynkiewicz17,
  author       = {Ewa Niewiadomska{-}Szynkiewicz and
                  Adam Kozakiewicz},
  title        = {Design and evaluation of a system for network threat signatures generation},
  journal      = {J. Comput. Sci.},
  volume       = {22},
  pages        = {187--197},
  year         = {2017}
}
@article{DBLP:journals/pami/CabreraFES17,
  author       = {Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Miguel A. Ferrer and
                  George S. Eskander and
                  Robert Sabourin},
  title        = {Generation of Duplicated Off-Line Signature Images for Verification
                  Systems},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {39},
  number       = {5},
  pages        = {951--964},
  year         = {2017}
}
@inproceedings{DBLP:conf/dasc/ShahriarB17,
  author       = {Hossain Shahriar and
                  William Bond},
  title        = {Towards an Attack Signature Generation Framework for Intrusion Detection
                  Systems},
  booktitle    = {DASC/PiCom/DataCom/CyberSciTech},
  pages        = {597--603},
  publisher    = {{IEEE} Computer Society},
  year         = {2017}
}
@inproceedings{DBLP:conf/smartgridcomm/BuneevaR17,
  author       = {Nadezda Buneeva and
                  Andreas Reinhardt},
  title        = {{AMBAL:} Realistic load signature generation for load disaggregation
                  performance evaluation},
  booktitle    = {SmartGridComm},
  pages        = {443--448},
  publisher    = {{IEEE}},
  year         = {2017}
}
@article{DBLP:journals/corr/abs-1711-08336,
  author       = {Eli David and
                  Nathan S. Netanyahu},
  title        = {DeepSign: Deep Learning for Automatic Malware Signature Generation
                  and Classification},
  journal      = {CoRR},
  volume       = {abs/1711.08336},
  year         = {2017}
}
@article{DBLP:journals/ieicet/ShaoKVP16,
  author       = {Min Shao and
                  Min Sik Kim and
                  Victor C. Valgenti and
                  Jungkeun Park},
  title        = {Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based
                  Network Intrusion Detection Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {8},
  pages        = {2090--2099},
  year         = {2016}
}
@article{DBLP:journals/ieicet/TamuraI16,
  author       = {Masato Tamura and
                  Makoto Ikeda},
  title        = {Montgomery Multiplier Design for {ECDSA} Signature Generation Processor},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {12},
  pages        = {2444--2452},
  year         = {2016}
}
@article{DBLP:journals/iet-ifs/SalazarTP16,
  author       = {Jos{\'{e}} Luis Salazar and
                  Jos{\'{e}} Luis Tornos and
                  Joan Josep Piles},
  title        = {Efficient ways of prime number generation for ring signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {33--36},
  year         = {2016}
}
@inproceedings{DBLP:conf/asscc/TamuraI16,
  author       = {Masato Tamura and
                  Makoto Ikeda},
  title        = {1.68{\(\mu\)}J/signature-generation 256-bit {ECDSA} over GF(p) signature
                  generator for IoT devices},
  booktitle    = {{A-SSCC}},
  pages        = {341--344},
  publisher    = {{IEEE}},
  year         = {2016}
}
@inproceedings{DBLP:conf/bigdataconf/JupinSD16,
  author       = {Joseph Jupin and
                  Justin Y. Shi and
                  Eduard C. Dragut},
  title        = {{PSH:} {A} probabilistic signature hash method with hash neighborhood
                  candidate generation for fast edit-distance string comparison on big
                  data},
  booktitle    = {{IEEE} BigData},
  pages        = {122--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2016}
}
@inproceedings{DBLP:conf/caise/BohmerR16,
  author       = {Kristof B{\"{o}}hmer and
                  Stefanie Rinderle{-}Ma},
  title        = {Automatic Signature Generation for Anomaly Detection in Business Process
                  Instance Data},
  booktitle    = {{BMMDS/EMMSAD}},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {248},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/ic-nc/SowaSYM16,
  author       = {Taiki Sowa and
                  Suguru Sunada and
                  Yasushi Yamazaki and
                  Takeru Miyazaki},
  title        = {Biometric Bit String Generation from Handwritten Signatures on Smart
                  Device},
  booktitle    = {{CANDAR}},
  pages        = {662--665},
  publisher    = {{IEEE} Computer Society},
  year         = {2016}
}
@inproceedings{DBLP:conf/icde/Kim0X16,
  author       = {Jongik Kim and
                  Chen Li and
                  Xiaohui Xie},
  title        = {Hobbes3: Dynamic generation of variable-length signatures for efficient
                  approximate subsequence mappings},
  booktitle    = {{ICDE}},
  pages        = {169--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2016}
}
@inproceedings{DBLP:conf/icfhr/CabreraCFBMCAP16,
  author       = {Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Sukalpa Chanda and
                  Miguel A. Ferrer and
                  Chayan Kumar Banerjee and
                  Anirban Majumdar and
                  Cristina Carmona{-}Duarte and
                  Parikshit Acharya and
                  Umapada Pal},
  title        = {Multiple Generation of Bengali Static Signatures},
  booktitle    = {{ICFHR}},
  pages        = {42--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2016}
}
@inproceedings{DBLP:conf/ictc/ChoiLCKK16a,
  author       = {Sunoh Choi and
                  Jooyoung Lee and
                  Yangseo Choi and
                  Jonghyun Kim and
                  Ikkyun Kim},
  title        = {Hierarchical network signature clustering and generation},
  booktitle    = {{ICTC}},
  pages        = {1191--1193},
  publisher    = {{IEEE}},
  year         = {2016}
}
@inproceedings{DBLP:conf/iwci/ChakrabortyRRU16,
  author       = {Narayan Ranjan Chakraborty and
                  Muhammad Taifur Rahman and
                  Md. Ekhlasur Rahman and
                  Mohammad Shorif Uddin},
  title        = {Generation and verification of digital signature with two factor authentication},
  booktitle    = {{IWCI}},
  pages        = {131--135},
  publisher    = {{IEEE}},
  year         = {2016}
}
@inproceedings{DBLP:conf/noms/Vasilomanolakis16a,
  author       = {Emmanouil Vasilomanolakis and
                  Shreyas Srinivasa and
                  Carlos Garcia Cordero and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Multi-stage attack detection and signature generation with {ICS} honeypots},
  booktitle    = {{NOMS}},
  pages        = {1227--1232},
  publisher    = {{IEEE}},
  year         = {2016}
}
@inproceedings{DBLP:conf/rait/BhowmickSMB16,
  author       = {Shib Sankar Bhowmick and
                  Indrajit Saha and
                  Ujjwal Maulik and
                  Debotosh Bhattacharjee},
  title        = {Identification of miRNA signature using Next-Generation Sequencing
                  data of prostate cancer},
  booktitle    = {{RAIT}},
  pages        = {528--533},
  publisher    = {{IEEE}},
  year         = {2016}
}
@inproceedings{DBLP:conf/smartcloud/ShangPLL16,
  author       = {Tao Shang and
                  Tianli Peng and
                  Qi Lei and
                  Jianwei Liu},
  title        = {Homomorphic Signature for Generation-based Network Coding},
  booktitle    = {SmartCloud},
  pages        = {269--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2016}
}
@inproceedings{DBLP:conf/spaccs/WangW16,
  author       = {Jie Wang and
                  Jie Wu},
  title        = {A Novel Signature Generation Approach in Noisy Environments for Detecting
                  Polymorphic Worm},
  booktitle    = {SpaCCS},
  series       = {Lecture Notes in Computer Science},
  volume       = {10066},
  pages        = {109--121},
  year         = {2016}
}
@article{DBLP:journals/compsec/Garcia-TeodoroD15,
  author       = {Pedro Garc{\'{\i}}a{-}Teodoro and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and
                  Juan E. Tapiador and
                  Rolando Salazar{-}Hern{\'{a}}ndez},
  title        = {Automatic generation of {HTTP} intrusion signatures by selective identification
                  of anomalies},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {159--174},
  year         = {2015}
}
@article{DBLP:journals/cryptologia/Horng15,
  author       = {Gwoboa Horng},
  title        = {Accelerating {DSA} Signature Generation},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {121--125},
  year         = {2015}
}
@article{DBLP:journals/ijssc/KuzunoT15,
  author       = {Hiroki Kuzuno and
                  Satoshi Tonami},
  title        = {Detection of sensitive information leakage in Android applications
                  using signature generation},
  journal      = {Int. J. Space Based Situated Comput.},
  volume       = {5},
  number       = {1},
  pages        = {53--62},
  year         = {2015}
}
@article{DBLP:journals/scn/HaoWLR15,
  author       = {Sun Hao and
                  Wen Wang and
                  Huabiao Lu and
                  Peige Ren},
  title        = {AutoMal: automatic clustering and signature generation for malwares
                  based on the network flow},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1845--1854},
  year         = {2015}
}
@inproceedings{DBLP:conf/cisc/TanT15,
  author       = {Yang Tan and
                  Shaohua Tang},
  title        = {Two Approaches to Build {UOV} Variants with Shorter Private Key and
                  Faster Signature Generation},
  booktitle    = {Inscrypt},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ica3pp/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  title        = {A Novel Signature Generation Approach for Polymorphic Worms},
  booktitle    = {{ICA3PP} {(3)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9530},
  pages        = {369--382},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ijcnn/DavidN15,
  author       = {Omid E. David and
                  Nathan S. Netanyahu},
  title        = {DeepSign: Deep learning for automatic malware signature generation
                  and classification},
  booktitle    = {{IJCNN}},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015}
}
@inproceedings{DBLP:conf/infocom/XuLMMBNA15,
  author       = {Qiang Xu and
                  Yong Liao and
                  Stanislav Miskovic and
                  Zhuoqing Morley Mao and
                  Mario Baldi and
                  Antonio Nucci and
                  Thomas Andrews},
  title        = {Automatic generation of mobile app signatures from traffic observations},
  booktitle    = {{INFOCOM}},
  pages        = {1481--1489},
  publisher    = {{IEEE}},
  year         = {2015}
}
@inproceedings{DBLP:conf/intrust/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  title        = {A Signature Generation Approach Based on Clustering for Polymorphic
                  Worm},
  booktitle    = {{INTRUST}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/pkc/CashDK15,
  author       = {David Cash and
                  Rafael Dowsley and
                  Eike Kiltz},
  title        = {Digital Signatures from Strong {RSA} without Prime Generation},
  booktitle    = {Public Key Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {217--235},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ica3pp/YangWZ14,
  author       = {Lili Yang and
                  Jie Wang and
                  Ping Zhong},
  title        = {Combining Supervised and Unsupervised Learning for Automatic Attack
                  Signature Generation System},
  booktitle    = {{ICA3PP} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8630},
  pages        = {607--618},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/icfhr/CabreraGMFG14,
  author       = {Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Marta Gomez{-}Barrero and
                  Aythami Morales and
                  Miguel Angel Ferrer{-}Ballester and
                  Javier Galbally},
  title        = {Generation of Enhanced Synthetic Off-Line Signatures Based on Real
                  On-Line Data},
  booktitle    = {{ICFHR}},
  pages        = {482--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2014}
}
@inproceedings{DBLP:conf/icst/AydinAB14,
  author       = {Abdulbaki Aydin and
                  Muath Alkhalaf and
                  Tevfik Bultan},
  title        = {Automated Test Generation from Vulnerability Signatures},
  booktitle    = {{ICST}},
  pages        = {193--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2014}
}
@inproceedings{DBLP:conf/iolts/HobeikaPLTBA14,
  author       = {Christelle Hobeika and
                  Simon Pichette and
                  M. A. Leonard and
                  Claude Thibeault and
                  Jean{-}Fran{\c{c}}ois Boland and
                  Yves Audet},
  title        = {Multi-abstraction level signature generation and comparison based
                  on radiation single event upset},
  booktitle    = {{IOLTS}},
  pages        = {212--215},
  publisher    = {{IEEE}},
  year         = {2014}
}
@inproceedings{DBLP:conf/snds/KaurS14,
  author       = {Ratinder Kaur and
                  Maninder Singh},
  title        = {Automatic Evaluation and Signature Generation Technique for Thwarting
                  Zero-Day Attacks},
  booktitle    = {{SNDS}},
  series       = {Communications in Computer and Information Science},
  volume       = {420},
  pages        = {298--309},
  publisher    = {Springer},
  year         = {2014}
}
@article{DBLP:journals/ieeesp/KaurS13,
  author       = {Sanmeet Kaur and
                  Maninder Singh},
  title        = {Automatic Attack Signature Generation Systems: {A} Review},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {6},
  pages        = {54--61},
  year         = {2013}
}
@article{DBLP:journals/ijdc/Spencer13,
  author       = {Ross Spencer},
  title        = {Generation of a Skeleton Corpus of Digital Objects for the Validation
                  and Evaluation of Format Identification Tools and Signatures},
  journal      = {Int. J. Digit. Curation},
  volume       = {8},
  number       = {1},
  pages        = {120--130},
  year         = {2013}
}
@article{DBLP:journals/jcp/AltwaijryS13,
  author       = {Hesham Altwaijry and
                  Khalid Shahbar},
  title        = {{(WHASG)} Automatic {SNORT} Signatures Generation by using Honeypot},
  journal      = {J. Comput.},
  volume       = {8},
  number       = {12},
  pages        = {3280--3286},
  year         = {2013}
}
@inproceedings{DBLP:conf/apnoms/KimC13,
  author       = {Hwan{-}Hee Kim and
                  Mi{-}Jung Choi},
  title        = {Towards automatic signature generation for identification of HTTP-based
                  applications},
  booktitle    = {{APNOMS}},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2013}
}
@inproceedings{DBLP:conf/ccs/YasudaDTS13,
  author       = {Takanori Yasuda and
                  Jintai Ding and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {A variant of rainbow with shorter secret key and faster signature
                  generation},
  booktitle    = {AsiaPKC@AsiaCCS},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2013}
}
@inproceedings{DBLP:conf/icb/Ferrer-BallesterCM13,
  author       = {Miguel Angel Ferrer{-}Ballester and
                  Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Aythami Morales},
  title        = {Synthetic off-line signature image generation},
  booktitle    = {{ICB}},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013}
}
@inproceedings{DBLP:conf/icde/KuzunoT13,
  author       = {Hiroki Kuzuno and
                  Satoshi Tonami},
  title        = {Signature generation for sensitive information leakage in android
                  applications},
  booktitle    = {{ICDE} Workshops},
  pages        = {112--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2013}
}
@inproceedings{DBLP:conf/iciap/PirloIPOCGR13,
  author       = {Giuseppe Pirlo and
                  Donato Impedovo and
                  Rejean Plamondon and
                  Christian O'Reilly and
                  A. Cozzolongo and
                  R. Gravinese and
                  Andrea Rollo},
  title        = {Stability of Dynamic Signatures: From the Representation to the Generation
                  Domain},
  booktitle    = {{ICIAP} Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {8158},
  pages        = {122--130},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13,
  author       = {Huabiao Lu and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {DiffSig: Resource Differentiation Based Malware Behavioral Concise
                  Signature Generation},
  booktitle    = {ICT-EurAsia},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/raid/RafiqueC13,
  author       = {M. Zubair Rafique and
                  Juan Caballero},
  title        = {{FIRMA:} Malware Clustering and Network Signature Generation with
                  Mixed Network Behaviors},
  booktitle    = {{RAID}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2013}
}
@article{DBLP:journals/corr/abs-1305-4045,
  author       = {Hiroki Kuzuno and
                  Satoshi Tonami},
  title        = {Signature Generation for Sensitive Information Leakage in Android
                  Applications},
  journal      = {CoRR},
  volume       = {abs/1305.4045},
  year         = {2013}
}
@article{DBLP:journals/itc/VenckauskasJMM12,
  author       = {Algimantas Venckauskas and
                  Nerijus Jusas and
                  Irena Mikuckiene and
                  Stasys Maciulevicius},
  title        = {Generation of the Secret Encryption Key Using the Signature of the
                  Embedded System},
  journal      = {Inf. Technol. Control.},
  volume       = {41},
  number       = {4},
  pages        = {368--375},
  year         = {2012}
}
@article{DBLP:journals/pik/VogelRS12,
  author       = {Michael Vogel and
                  Ren{\'{e}} Rietz and
                  Sebastian Schmerl},
  title        = {Automated Generation of Precise Signatures},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {35},
  number       = {1},
  pages        = {40--45},
  year         = {2012}
}
@article{DBLP:journals/pr/GalballyFOP12,
  author       = {Javier Galbally and
                  Julian Fi{\'{e}}rrez{-}Aguilar and
                  Javier Ortega{-}Garcia and
                  R{\'{e}}jean Plamondon},
  title        = {Synthetic on-line signature generation. Part {II:} Experimental validation},
  journal      = {Pattern Recognit.},
  volume       = {45},
  number       = {7},
  pages        = {2622--2632},
  year         = {2012}
}
@article{DBLP:journals/pr/GalballyPFO12,
  author       = {Javier Galbally and
                  R{\'{e}}jean Plamondon and
                  Julian Fi{\'{e}}rrez{-}Aguilar and
                  Javier Ortega{-}Garcia},
  title        = {Synthetic on-line signature generation. Part {I:} Methodology and
                  algorithms},
  journal      = {Pattern Recognit.},
  volume       = {45},
  number       = {7},
  pages        = {2610--2621},
  year         = {2012}
}
@inproceedings{DBLP:conf/iccomm/SerbP12,
  author       = {Mihai Serb and
                  Victor Valeriu Patriciu},
  title        = {Using MTMs to secure electronic signatures generation},
  booktitle    = {{COMM}},
  pages        = {315--318},
  publisher    = {{IEEE}},
  year         = {2012}
}
@inproceedings{DBLP:conf/visapp/DOrazioG12,
  author       = {Tiziana D'Orazio and
                  Cataldo Guaragnella},
  title        = {A Graph-based Signature Generation for People Re-identification in
                  a Multi-camera Surveillance System},
  booktitle    = {{VISAPP} {(1)}},
  pages        = {414--417},
  publisher    = {SciTePress},
  year         = {2012}
}
@phdthesis{DBLP:phd/us/Hu11,
  author       = {Xin Hu},
  title        = {Large Scale Malware Analysis, Detection and Signature Generation},
  school       = {University of Michigan, {USA}},
  year         = {2011}
}
@article{DBLP:journals/ejasp/LeeC11,
  author       = {Mn{-}Ta Lee and
                  Hsuan T. Chang},
  title        = {On the pinned field image binarization for signature generation in
                  image ownership verification method},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2011},
  pages        = {44},
  year         = {2011}
}
@article{DBLP:journals/ijisec/KongJGZLX11,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  title        = {{SAS:} semantics aware signature generation for polymorphic worm detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {5},
  pages        = {269--283},
  year         = {2011}
}
@article{DBLP:journals/tc/TangXL11,
  author       = {Yong Tang and
                  Bin Xiao and
                  Xicheng Lu},
  title        = {Signature Tree Generation for Polymorphic Worms},
  journal      = {{IEEE} Trans. Computers},
  volume       = {60},
  number       = {4},
  pages        = {565--579},
  year         = {2011}
}
@article{DBLP:journals/tsmc/ShabtaiME11,
  author       = {Asaf Shabtai and
                  Eitan Menahem and
                  Yuval Elovici},
  title        = {F-Sign: Automatic, Function-Based Signature Generation for Malware},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {41},
  number       = {4},
  pages        = {494--508},
  year         = {2011}
}
@inproceedings{DBLP:conf/biosig/ScheuermannBH11,
  author       = {Dirk Scheuermann and
                  Bastian Wolfgruber and
                  Olaf Henniger},
  title        = {On biometric key generation from handwritten signatures},
  booktitle    = {{BIOSIG}},
  series       = {{LNI}},
  volume       = {{P-191}},
  pages        = {103--114},
  publisher    = {{GI}},
  year         = {2011}
}
@inproceedings{DBLP:conf/valuetools/SzaboTTMS11,
  author       = {G{\'{e}}za Szab{\'{o}} and
                  Zolt{\'{a}}n Richard Tur{\'{a}}nyi and
                  L{\'{a}}szl{\'{o}} Toka and
                  S{\'{a}}ndor Moln{\'{a}}r and
                  Alysson Santos},
  title        = {Automatic protocol signature generation framework for deep packet
                  inspection},
  booktitle    = {{VALUETOOLS}},
  pages        = {291--299},
  publisher    = {{ICST/ACM}},
  year         = {2011}
}
@inproceedings{DBLP:conf/vts/BanerjeeSDC11,
  author       = {Aritra Banerjee and
                  Shreyas Sen and
                  Shyam Kumar Devarakond and
                  Abhijit Chatterjee},
  title        = {Automatic test stimulus generation for accurate diagnosis of {RF}
                  systems using transient response signatures},
  booktitle    = {{VTS}},
  pages        = {58--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2011}
}
@article{DBLP:journals/ijnsec/KattiK10,
  author       = {Rajendra S. Katti and
                  Rajesh G. Kavasseri},
  title        = {Nonce Generation For The Digital Signature Standard},
  journal      = {Int. J. Netw. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {23--32},
  year         = {2010}
}
@article{DBLP:journals/ton/WangLCFL10,
  author       = {Lanjia Wang and
                  Zhichun Li and
                  Yan Chen and
                  Zhi Fu and
                  Xing Li},
  title        = {Thwarting zero-day polymorphic worms with network-level length-based
                  signature generation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {1},
  pages        = {53--66},
  year         = {2010}
}
@inproceedings{DBLP:conf/acl/DurmeL10,
  author       = {Benjamin Van Durme and
                  Ashwin Lall},
  title        = {Online Generation of Locality Sensitive Hash Signatures},
  booktitle    = {{ACL} {(2)}},
  pages        = {231--235},
  publisher    = {The Association for Computer Linguistics},
  year         = {2010}
}
@inproceedings{DBLP:conf/acl/ShezafR10,
  author       = {Daphna Shezaf and
                  Ari Rappoport},
  title        = {Bilingual Lexicon Generation Using Non-Aligned Signatures},
  booktitle    = {{ACL}},
  pages        = {98--107},
  publisher    = {The Association for Computer Linguistics},
  year         = {2010}
}
@inproceedings{DBLP:conf/aict/Garcia-TeodoroMR10,
  author       = {Pedro Garcia{-}Teodoro and
                  Pablo Mu{\~{n}}oz{-}Feldstedt and
                  David Ruete{-}Z{\'{u}}{\~{n}}iga},
  title        = {Automatic Signature Generation for Network Services through Selective
                  Extraction of Anomalous Contents},
  booktitle    = {{AICT}},
  pages        = {370--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2010}
}
@inproceedings{DBLP:conf/arc/Shoufan10,
  author       = {Abdulhadi Shoufan},
  title        = {An {FPGA} Accelerator for Hash Tree Generation in the Merkle Signature
                  Scheme},
  booktitle    = {{ARC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5992},
  pages        = {145--156},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/arcs/Fechner10,
  author       = {Bernhard Fechner},
  title        = {GPU-Based Parallel Signature Scanning and Hash Generation},
  booktitle    = {{ARCS} Workshops},
  pages        = {133--138},
  publisher    = {{VDE} Verlag},
  year         = {2010}
}
@inproceedings{DBLP:conf/icip/ChaisornSM10,
  author       = {Lekha Chaisorn and
                  Janya Sainui and
                  Corey Manders},
  title        = {Fast and efficient video signature generation and matching for online
                  video sharing},
  booktitle    = {{ICIP}},
  pages        = {2129--2132},
  publisher    = {{IEEE}},
  year         = {2010}
}
@inproceedings{DBLP:conf/infocom/ZhangKP10,
  author       = {Junxing Zhang and
                  Sneha Kumar Kasera and
                  Neal Patwari},
  title        = {Mobility Assisted Secret Key Generation Using Wireless Link Signatures},
  booktitle    = {{INFOCOM}},
  pages        = {261--265},
  publisher    = {{IEEE}},
  year         = {2010}
}
@inproceedings{DBLP:conf/nsdi/PerdisciLF10,
  author       = {Roberto Perdisci and
                  Wenke Lee and
                  Nick Feamster},
  title        = {Behavioral Clustering of HTTP-Based Malware and Signature Generation
                  Using Malicious Network Traces},
  booktitle    = {{NSDI}},
  pages        = {391--404},
  publisher    = {{USENIX} Association},
  year         = {2010}
}
@inproceedings{DBLP:conf/pdcat/Tang10,
  author       = {Xinyu Tang},
  title        = {The Generation of Attack Signatures Based on Virtual Honeypots},
  booktitle    = {{PDCAT}},
  pages        = {435--439},
  publisher    = {{IEEE} Computer Society},
  year         = {2010}
}
@inproceedings{DBLP:conf/securecomm/KongJGZLX10,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  title        = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection},
  booktitle    = {SecureComm},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2010}
}
@article{DBLP:journals/eswa/LuminiN09,
  author       = {Alessandra Lumini and
                  Loris Nanni},
  title        = {Ensemble of on-line signature matchers based on OverComplete feature
                  generation},
  journal      = {Expert Syst. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {5291--5296},
  year         = {2009}
}
@inproceedings{DBLP:conf/acsac/LiJS09,
  author       = {Lixin Li and
                  James E. Just and
                  R. Sekar},
  title        = {Online Signature Generation for Windows Systems},
  booktitle    = {{ACSAC}},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@inproceedings{DBLP:conf/broadcom/MohammedCVHA09,
  author       = {Mohssen Mohammed Zian Elaabdeen Mohammed and
                  H. Anthony Chan and
                  Neco Ventura and
                  Mohsin Hashim and
                  Ezzeldien Amin},
  title        = {Signature Generation for Zero-day Polymorphic Works},
  booktitle    = {BroadBandCom},
  pages        = {295--300},
  publisher    = {Wroc{\l}aw University of Technology},
  year         = {2009}
}
@inproceedings{DBLP:conf/cis/YaoLZ09,
  author       = {Li Yao and
                  Yu Liu and
                  Yuqing Zhang},
  title        = {An Integrated Approach to Worm Detection and Automatic Signature Generation},
  booktitle    = {{CIS} {(2)}},
  pages        = {371--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@inproceedings{DBLP:conf/csiirw/WyschogrodD09,
  author       = {Daniel Wyschogrod and
                  Jeffrey Dezso},
  title        = {Using automatic signature generation as a sensor backend},
  booktitle    = {{CSIIRW}},
  pages        = {29},
  publisher    = {{ACM}},
  year         = {2009}
}
@inproceedings{DBLP:conf/depcos/Tylman09,
  author       = {Wojciech Tylman},
  title        = {Data Mining Techniques for Semi-automatic Signature Generation},
  booktitle    = {DepCoS-RELCOMEX},
  pages        = {210--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@inproceedings{DBLP:conf/icc/WangWCZ09,
  author       = {Jie Wang and
                  Jianxin Wang and
                  Jianer Chen and
                  Xi Zhang},
  title        = {An Automated Signature Generation Approach for Polymorphic Worm Based
                  on Color Coding},
  booktitle    = {{ICC}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009}
}
@inproceedings{DBLP:conf/raid/GriffinSHC09,
  author       = {Kent Griffin and
                  Scott Schneider and
                  Xin Hu and
                  Tzi{-}cker Chiueh},
  title        = {Automatic Generation of String Signatures for Malware Detection},
  booktitle    = {{RAID}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2009}
}
@article{DBLP:journals/jsea/LiXYW08,
  author       = {Nan Li and
                  Chunhe Xia and
                  Yi Yang and
                  Haiquan Wang},
  title        = {An Algorithm for Generation of Attack Signatures Based on Sequences
                  Alignment},
  journal      = {J. Softw. Eng. Appl.},
  volume       = {1},
  number       = {1},
  pages        = {76--82},
  year         = {2008}
}
@article{DBLP:journals/tdsc/BrumleyNSWJ08,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Theory and Techniques for Automatic Generation of Vulnerability-Based
                  Signatures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {224--241},
  year         = {2008}
}
@article{DBLP:journals/tissec/WangLCXRK08,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jong Youl Choi and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil},
  title        = {Fast and Black-box Exploit Detection and Signature Generation for
                  Commodity Software},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {11:1--11:35},
  year         = {2008}
}
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08,
  author       = {V. Sai Sathyanarayan and
                  Pankaj Kohli and
                  Bezawada Bruhadeshwar},
  title        = {Signature Generation and Detection of Malware Families},
  booktitle    = {{ACISP}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {336--349},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/acsac/NandaC08,
  author       = {Susanta Nanda and
                  Tzi{-}cker Chiueh},
  title        = {Execution Trace-Driven Automated Attack Signature Generation},
  booktitle    = {{ACSAC}},
  pages        = {195--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/asap/BalasubramanianCBRD08,
  author       = {Sundar Balasubramanian and
                  Harold W. Carter and
                  Andrey Bogdanov and
                  Andy Rupp and
                  Jintai Ding},
  title        = {Fast multivariate signature generation in hardware: The case of rainbow},
  booktitle    = {{ASAP}},
  pages        = {25--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/bliss/HoqueFH08,
  author       = {Sanaul Hoque and
                  Michael C. Fairhurst and
                  W. Gareth J. Howells},
  title        = {Evaluating Biometric Encryption Key Generation Using Handwritten Signatures},
  booktitle    = {{BLISS}},
  pages        = {17--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/broadcom/MohammedC08,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan},
  title        = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet},
  booktitle    = {BroadCom},
  pages        = {142--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08,
  author       = {Urko Zurutuza and
                  Roberto Uribeetxeberria and
                  Diego Zamboni},
  title        = {A data mining approach for analysis of worm activity through automatic
                  signature generation},
  booktitle    = {AISec},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2008}
}
@inproceedings{DBLP:conf/csse/LiXYW08,
  author       = {Nan Li and
                  Chunhe Xia and
                  Yi Yang and
                  Haiquan Wang},
  title        = {An Algorithm for Generation of Attack Signatures Based on Sequences
                  Alignment},
  booktitle    = {{CSSE} {(3)}},
  pages        = {964--969},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/delta/DoulcierFR08,
  author       = {M. Doulcier and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre},
  title        = {AES-Based {BIST:} Self-Test, Test Pattern Generation and Signature
                  Analysis},
  booktitle    = {{DELTA}},
  pages        = {314--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/dsn/LiWLR08,
  author       = {Zhuowei Li and
                  XiaoFeng Wang and
                  Zhenkai Liang and
                  Michael K. Reiter},
  title        = {{AGIS:} Towards automatic generation of infection signatures},
  booktitle    = {{DSN}},
  pages        = {237--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/fccm/BalasubramanianBRDC08,
  author       = {Sundar Balasubramanian and
                  Andrey Bogdanov and
                  Andy Rupp and
                  Jintai Ding and
                  Harold W. Carter},
  title        = {Fast Multivariate Signature Generation in Hardware: The Case of Rainbow},
  booktitle    = {{FCCM}},
  pages        = {281--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/imsccs/YaoLGZY08,
  author       = {Yu Yao and
                  Junwei Lv and
                  Fuxiang Gao and
                  Yanfang Zhang and
                  Ge Yu},
  title        = {Behavior-Based Worm Detection and Signature Generation},
  booktitle    = {{IMSCCS}},
  pages        = {124--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/ndss/VenkataramanBS08,
  author       = {Shobha Venkataraman and
                  Avrim Blum and
                  Dawn Song},
  title        = {Limits of Learning-based Signature Generation with Adversaries},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/noms/ParkWKH08,
  author       = {Byung{-}Chul Park and
                  Young J. Won and
                  Myung{-}Sup Kim and
                  James W. Hong},
  title        = {Towards automated application signature generation for traffic identification},
  booktitle    = {{NOMS}},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2008}
}
@inproceedings{DBLP:conf/waim/XiaoHCL08,
  author       = {Fengtao Xiao and
                  Huaping Hu and
                  Xin Chen and
                  Bo Liu},
  title        = {{ASG} Automated Signature Generation for Worm-Like {P2P} Traffic Patterns},
  booktitle    = {{WAIM}},
  pages        = {654--660},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@article{DBLP:journals/tdsc/CaiHPP07,
  author       = {Min Cai and
                  Kai Hwang and
                  Jianping Pan and
                  Christos Papadopoulos},
  title        = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint
                  Aggregation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {88--104},
  year         = {2007}
}
@article{DBLP:journals/tdsc/HwangCCQ07,
  author       = {Kai Hwang and
                  Min Cai and
                  Ying Chen and
                  Min Qin},
  title        = {Hybrid Intrusion Detection with Weighted Signature Generation over
                  Anomalous Internet Episodes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {41--55},
  year         = {2007}
}
@inproceedings{DBLP:conf/acsac/GundyCSV07,
  author       = {Matthew Van Gundy and
                  Hao Chen and
                  Zhendong Su and
                  Giovanni Vigna},
  title        = {Feature Omission Vulnerabilities: Thwarting Signature Generation for
                  Polymorphic Worms},
  booktitle    = {{ACSAC}},
  pages        = {74--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/faw/JoSL07,
  author       = {Je{-}Gyeong Jo and
                  Jong{-}Won Seo and
                  Hyung{-}Woo Lee},
  title        = {Biometric Digital Signature Key Generation and Cryptography Communication
                  Based on Fingerprint},
  booktitle    = {{FAW}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4613},
  pages        = {38--49},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/icnp/LiWCF07,
  author       = {Zhichun Li and
                  Lanjia Wang and
                  Yan Chen and
                  Zhi Fu},
  title        = {Network-based and Attack-resilient Length Signature Generation for
                  Zero-day Polymorphic Worms},
  booktitle    = {{ICNP}},
  pages        = {164--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/iih-msp/TanakaSEY07,
  author       = {Hideaki Tanaka and
                  Shoichi Sasaki and
                  Isao Echizen and
                  Hiroshi Yoshiura},
  title        = {Secure Generation of Digital Signature on Compromised Computer},
  booktitle    = {{IIH-MSP}},
  pages        = {12--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/kesamsta/KimLK07a,
  author       = {Sijung Kim and
                  Geuk Lee and
                  Bonghan Kim},
  title        = {The Design and Testing of Automated Signature Generation Engine for
                  Worms Detection},
  booktitle    = {{KES-AMSTA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4496},
  pages        = {956--963},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/rcis/Nait-Sidi-MohWRG07,
  author       = {Ahmed Nait{-}Sidi{-}Moh and
                  Maxime Wack and
                  Damien Rieupet and
                  Jaafar Gaber},
  title        = {On an innovative generation method of electronic signatures: comparative
                  study with traditional hash functions simulation},
  booktitle    = {{RCIS}},
  pages        = {357--360},
  year         = {2007}
}
@inproceedings{DBLP:conf/acsac/WangJG06,
  author       = {Hao Wang and
                  Somesh Jha and
                  Vinod Ganapathy},
  title        = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}},
  booktitle    = {{ACSAC}},
  pages        = {99--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2006}
}
@inproceedings{DBLP:conf/ccs/WangLXRKC06,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil and
                  Jong Youl Choi},
  title        = {Packet vaccine: black-box exploit detection and signature generation},
  booktitle    = {{CCS}},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {2006}
}
@inproceedings{DBLP:conf/eurosys/PortokalidisSB06,
  author       = {Georgios Portokalidis and
                  Asia Slowinska and
                  Herbert Bos},
  title        = {Argos: an emulator for fingerprinting zero-day attacks for advertised
                  honeypots with automatic signature generation},
  booktitle    = {EuroSys},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2006}
}
@inproceedings{DBLP:conf/icb/YipGNT06,
  author       = {Wai Kuan Yip and
                  Alwyn Goh and
                  David Ngo Chek Ling and
                  Andrew Teoh Beng Jin},
  title        = {Generation of Replaceable Cryptographic Keys from Dynamic Handwritten
                  Signatures},
  booktitle    = {{ICB}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3832},
  pages        = {509--515},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/mrcs/WahlHHI06,
  author       = {Alain Wahl and
                  Jean Hennebert and
                  Andreas Humm and
                  Rolf Ingold},
  title        = {Generation and Evaluation of Brute-Force Signature Forgeries},
  booktitle    = {{MRCS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4105},
  pages        = {2--9},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/raid/ChungM06,
  author       = {Simon P. Chung and
                  Aloysius K. Mok},
  title        = {Allergy Attack Against Automatic Signature Generation},
  booktitle    = {{RAID}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Towards Automatic Generation of Vulnerability-Based Signatures},
  booktitle    = {S{\&}P},
  pages        = {2--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2006}
}
@inproceedings{DBLP:conf/sp/LiSCKC06,
  author       = {Zhichun Li and
                  Manan Sanghi and
                  Yan Chen and
                  Ming{-}Yang Kao and
                  Brian Chavez},
  title        = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with
                  Provable Attack Resilience},
  booktitle    = {S{\&}P},
  pages        = {32--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2006}
}
@inproceedings{DBLP:conf/acsac/LiangS05,
  author       = {Zhenkai Liang and
                  R. Sekar},
  title        = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach
                  Based on Program Behavior Models},
  booktitle    = {{ACSAC}},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2005}
}
@inproceedings{DBLP:conf/ccs/LiangS05,
  author       = {Zhenkai Liang and
                  R. Sekar},
  title        = {Fast and automated generation of attack signatures: a basis for building
                  self-protecting servers},
  booktitle    = {{CCS}},
  pages        = {213--222},
  publisher    = {{ACM}},
  year         = {2005}
}
@inproceedings{DBLP:conf/icc/DyerN05,
  author       = {Justin S. Dyer and
                  Balasubramaniam Natarajan},
  title        = {A new deterministic algorithm for {DS-CDMA} signature sequence generation},
  booktitle    = {{ICC}},
  pages        = {2348--2351},
  publisher    = {{IEEE}},
  year         = {2005}
}
@inproceedings{DBLP:conf/ism/SimkhadaTWN05,
  author       = {Kumar Simkhada and
                  Hiroshi Tsunoda and
                  Yuji Waizumi and
                  Yoshiaki Nemoto},
  title        = {Differencing Worm Flows and Normal Flows for Automatic Generation
                  of Worm Signatures},
  booktitle    = {{ISM}},
  pages        = {680--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2005}
}
@inproceedings{DBLP:conf/raid/WangCS05,
  author       = {Ke Wang and
                  Gabriela F. Cretu and
                  Salvatore J. Stolfo},
  title        = {Anomalous Payload-Based Worm Detection and Signature Generation},
  booktitle    = {{RAID}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {227--246},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/securecomm/TangCR05,
  author       = {Caimu Tang and
                  Anthony T. Chronopoulos and
                  Cauligi S. Raghavendra},
  title        = {Soft-Timeout Distributed Key Generation for Digital Signature based
                  on Elliptic Curve D-log for Low-Power Devices},
  booktitle    = {SecureComm},
  pages        = {353--364},
  publisher    = {{IEEE}},
  year         = {2005}
}
@inproceedings{DBLP:conf/sp/RubinJM05,
  author       = {Shai Rubin and
                  Somesh Jha and
                  Barton P. Miller},
  title        = {Language-Based Generation and Evaluation of {NIDS} Signatures},
  booktitle    = {S{\&}P},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2005}
}
@article{DBLP:journals/iam/GuptaTM04,
  author       = {Alok Gupta and
                  Y. Alex Tung and
                  James R. Marsden},
  title        = {Digital signature: use and modification to achieve success in next
                  generational e-business processes},
  journal      = {Inf. Manag.},
  volume       = {41},
  number       = {5},
  pages        = {561--575},
  year         = {2004}
}
@article{DBLP:journals/ieicet/SameshimaSOM04,
  author       = {Yoshiki Sameshima and
                  Hideaki Saisho and
                  Kazuko Oyanagi and
                  Tsutomu Matsumoto},
  title        = {Multiparty {DSA} Signature Generation without Simultaneous User Operations},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {87-D},
  number       = {8},
  pages        = {2095--2105},
  year         = {2004}
}
@article{DBLP:journals/ijisec/MacKenzieR04,
  author       = {Philip D. MacKenzie and
                  Michael K. Reiter},
  title        = {Two-party generation of {DSA} signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {2},
  number       = {3-4},
  pages        = {218--239},
  year         = {2004}
}
@inproceedings{DBLP:conf/iccsa/KwonL04,
  author       = {Taekyoung Kwon and
                  Jaeil Lee},
  title        = {Practical Digital Signature Generation Using Biometrics},
  booktitle    = {{ICCSA} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3043},
  pages        = {728--737},
  publisher    = {Springer},
  year         = {2004}
}
@article{DBLP:journals/corr/cs-CR-0409014,
  author       = {Manoj Kumar},
  title        = {A Digital Signature with Threshold Generation and Verification},
  journal      = {CoRR},
  volume       = {cs.CR/0409014},
  year         = {2004}
}
@article{DBLP:journals/bioinformatics/SadowskiP03,
  author       = {Michael I. Sadowski and
                  John Howard Parish},
  title        = {Automated generation and refinement of protein signatures: case study
                  with G-protein coupled receptors},
  journal      = {Bioinform.},
  volume       = {19},
  number       = {6},
  pages        = {727--734},
  year         = {2003}
}
@inproceedings{DBLP:conf/cdc/YoussefA03,
  author       = {Bilal Youssef and
                  Mazen Alamir},
  title        = {Generic signature generation tool for diagnosis and parametric estimation
                  of multi-variable dynamical nonlinear systems},
  booktitle    = {{CDC}},
  pages        = {966--971},
  publisher    = {{IEEE}},
  year         = {2003}
}
@article{DBLP:journals/imcs/FengW02,
  author       = {Feng Hao and
                  Chan Choong Wah},
  title        = {Private key generation from on-line handwritten signatures},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {159--164},
  year         = {2002}
}
@inproceedings{DBLP:conf/crypto/MacKenzieR01,
  author       = {Philip D. MacKenzie and
                  Michael K. Reiter},
  title        = {Two-Party Generation of {DSA} Signatures},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/ctrsa/Huhnlein01,
  author       = {Detlef H{\"{u}}hnlein},
  title        = {Faster Generation of NICE-Schnorr-Type Signatures},
  booktitle    = {{CT-RSA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/indocrypt/Ramesh01,
  author       = {D. Ramesh},
  title        = {A Twin Algorithm for Efficient Generation of Digital Signatures},
  booktitle    = {{INDOCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {267--274},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/iwvf/Nishida01,
  author       = {Hirobumi Nishida},
  title        = {Robust Structural Indexing through Quasi-Invariant Shape Signatures
                  and Feature Generation},
  booktitle    = {{IWVF}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2059},
  pages        = {696--705},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/pkc/JakobssonW01,
  author       = {Markus Jakobsson and
                  Susanne Wetzel},
  title        = {Secure Server-Aided Signature Generation},
  booktitle    = {Public Key Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {383--401},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/ats/ShiehLS00,
  author       = {Ming{-}Der Shieh and
                  Hsin{-}Fu Lo and
                  Ming{-}Hwa Sheu},
  title        = {High-speed generation of {LFSR} signatures},
  booktitle    = {Asian Test Symposium},
  pages        = {222},
  publisher    = {{IEEE} Computer Society},
  year         = {2000}
}
@inproceedings{DBLP:conf/icassp/YarmanA00,
  author       = {B. Siddik Yarman and
                  Rafet Akdeniz},
  title        = {Generation of optimum signature base sequences for speech signals},
  booktitle    = {{ICASSP}},
  pages        = {1077--1080},
  publisher    = {{IEEE}},
  year         = {2000}
}
@inproceedings{DBLP:conf/edcc/Echtle99,
  author       = {Klaus Echtle},
  title        = {Avoiding Malicious Byzantine Faults by a New Signature Generation
                  Technique},
  booktitle    = {{EDCC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1667},
  pages        = {106--123},
  publisher    = {Springer},
  year         = {1999}
}
@article{DBLP:journals/vldb/ChakrabartiDAR98,
  author       = {Soumen Chakrabarti and
                  Byron Dom and
                  Rakesh Agrawal and
                  Prabhakar Raghavan},
  title        = {Scalable Feature Selection, Classification and Signature Generation
                  for Organizing Large Text Databases into Hierarchical Topic Taxonomies},
  journal      = {{VLDB} J.},
  volume       = {7},
  number       = {3},
  pages        = {163--178},
  year         = {1998}
}
@inproceedings{DBLP:conf/eurocrypt/PoupardS98,
  author       = {Guillaume Poupard and
                  Jacques Stern},
  title        = {Security Analysis of a Practical "on the fly" Authentication and Signature
                  Generation},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {422--436},
  publisher    = {Springer},
  year         = {1998}
}
@inproceedings{DBLP:conf/eusipco/KinoshitaS98,
  author       = {Hirotsugu Kinoshita and
                  Masafumi Satoh},
  title        = {Generation of the signature with the structured information of the
                  image},
  booktitle    = {{EUSIPCO}},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {1998}
}
@inproceedings{DBLP:conf/bsdia/OliveiraKBS97,
  author       = {Claudio de Oliveira and
                  Celso A. A. Kaestner and
                  Fl{\'{a}}vio Bortolozzi and
                  Robert Sabourin},
  title        = {Generation of Signatures by Deformations},
  booktitle    = {{BSDIA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1339},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {1997}
}
@inproceedings{DBLP:conf/spieSR/CelentanoL97,
  author       = {Augusto Celentano and
                  Vincenzo Di Lecce},
  title        = {FFT-Based Technique for Image-Signature Generation},
  booktitle    = {Storage and Retrieval for Image and Video Databases {(SPIE)}},
  series       = {{SPIE} Proceedings},
  volume       = {3022},
  pages        = {457--466},
  publisher    = {{SPIE}},
  year         = {1997}
}
@inproceedings{DBLP:conf/ccs/MRaihiN96,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache},
  title        = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy},
  booktitle    = {{CCS}},
  pages        = {58--61},
  publisher    = {{ACM}},
  year         = {1996}
}
@inproceedings{DBLP:conf/crypto/CramesD96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {New Generation of Secure and Practical RSA-Based Signatures},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {173--185},
  publisher    = {Springer},
  year         = {1996}
}
@inproceedings{DBLP:conf/acm/YoungL94,
  author       = {Hwan{-}Seung Yong and
                  Sukho Lee},
  title        = {Signature File Generation Techniques for Query Processing in Object-Oriented
                  Databases},
  booktitle    = {{ACM} Conference on Computer Science},
  pages        = {364--371},
  publisher    = {{ACM}},
  year         = {1994}
}
@article{DBLP:journals/tods/LengL92,
  author       = {Chun{-}Wu Roger Leng and
                  Dik Lun Lee},
  title        = {Optimal Weight Assignment for Signature Generation},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {17},
  number       = {2},
  pages        = {346--373},
  year         = {1992}
}
@article{DBLP:journals/joc/Schnorr91,
  author       = {Claus{-}Peter Schnorr},
  title        = {Efficient Signature Generation by Smart Cards},
  journal      = {J. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {161--174},
  year         = {1991}
}
@inproceedings{DBLP:conf/crypto/DesmedtF91,
  author       = {Yvo Desmedt and
                  Yair Frankel},
  title        = {Shared Generation of Authenticators and Signatures (Extended Abstract)},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {457--469},
  publisher    = {Springer},
  year         = {1991}
}
@inproceedings{DBLP:conf/eurocrypt/OngS90,
  author       = {H. Ong and
                  Claus{-}Peter Schnorr},
  title        = {Fast Signature Generation With a Fiat Shamir-Like Scheme},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {432--440},
  publisher    = {Springer},
  year         = {1990}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics