Search dblp for Publications

export results for "signature generation"

 download as .bib file

@article{DBLP:journals/mta/PandeyBS24,
  author       = {Sachi Pandey and
                  Ritin Behl and
                  Amit Sinha},
  title        = {Decentralized blockchain-based security enhancement with lamport merkle
                  digital signature generation and optimized encryption in cloud environment},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {16},
  pages        = {47269--47293},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17365-8},
  doi          = {10.1007/S11042-023-17365-8},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/PandeyBS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/LazebnikK23,
  author       = {Teddy Lazebnik and
                  Liron Simon Keren},
  title        = {Cancer-inspired genomics mapper model for the generation of synthetic
                  {DNA} sequences with desired genomics signatures},
  journal      = {Comput. Biol. Medicine},
  volume       = {164},
  pages        = {107221},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compbiomed.2023.107221},
  doi          = {10.1016/J.COMPBIOMED.2023.107221},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/LazebnikK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ArabNC23,
  author       = {Naouel Arab and
                  Hassiba Nemmour and
                  Youcef Chibani},
  title        = {A new synthetic feature generation scheme based on artificial immune
                  systems for robust offline signature verification},
  journal      = {Expert Syst. Appl.},
  volume       = {213},
  number       = {Part},
  pages        = {119306},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2022.119306},
  doi          = {10.1016/J.ESWA.2022.119306},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/ArabNC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KobayashiKKO23,
  author       = {Masaki Kobayashi and
                  Yo Kanemoto and
                  Daisuke Kotani and
                  Yasuo Okabe},
  title        = {Generation of {IDS} Signatures through Exhaustive Execution Path Exploration
                  in PoC Codes for Vulnerabilities},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {591--601},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.591},
  doi          = {10.2197/IPSJJIP.31.591},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/KobayashiKKO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/SimESYKS23,
  author       = {Minjoo Sim and
                  Siwoo Eum and
                  Gyeongju Song and
                  Yujin Yang and
                  Wonwoong Kim and
                  Hwajeong Seo},
  title        = {{K-XMSS} and {K-SPHINCS+:} Enhancing Security in Next-Generation Mobile
                  Communication and Internet Systems with Hash Based Signatures Using
                  Korean Cryptography Algorithms},
  journal      = {Sensors},
  volume       = {23},
  number       = {17},
  pages        = {7558},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23177558},
  doi          = {10.3390/S23177558},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/SimESYKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/NguyenG23,
  author       = {Duc Tri Nguyen and
                  Kris Gaj},
  editor       = {Nadia El Mrabet and
                  Luca De Feo and
                  Sylvain Duquesne},
  title        = {Fast Falcon Signature Generation and Verification Using ARMv8 {NEON}
                  Instructions},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference
                  on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14064},
  pages        = {417--441},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37679-5\_18},
  doi          = {10.1007/978-3-031-37679-5\_18},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/NguyenG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eicc/RomeroMAARV23,
  author       = {Agust{\'{\i}}n Walabonso Lara Romero and
                  Juan Antonio Ternero Mu{\~{n}}iz and
                  Rafael M. Estepa{-}Alonso and
                  Antonio Jose Estepa Alonso and
                  Fernando Ruiz Robles and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo},
  editor       = {Aleksandra Mileva and
                  Steffen Wendzel and
                  Virginia N. L. Franqueira},
  title        = {{HTTP} Cyberattacks Detection through Automatic Signature Generation
                  in multi-site IoT Deployments},
  booktitle    = {Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference,
                  {EICC} 2023, Stavanger, Norway, June 14-15, 2023},
  pages        = {65--70},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3590777.3590788},
  doi          = {10.1145/3590777.3590788},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eicc/RomeroMAARV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihci/KumarSRS23,
  author       = {Suneel Kumar and
                  Mona Singh and
                  Ruchilekha and
                  Manoj Kumar Singh},
  editor       = {Bong Jun Choi and
                  Dhananjay Singh and
                  Uma Shanker Tiwary and
                  Wan{-}Young Chung},
  title        = {Semantic Segmentation Based Image Signature Generation for {CBIR}},
  booktitle    = {Intelligent Human Computer Interaction - 15th International Conference,
                  {IHCI} 2023, Daegu, South Korea, November 8-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14532},
  pages        = {319--329},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-53830-8\_33},
  doi          = {10.1007/978-3-031-53830-8\_33},
  timestamp    = {Mon, 11 Mar 2024 15:20:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ihci/KumarSRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/irps/MalikJCMKSBVS23,
  author       = {Rasik Rashid Malik and
                  Vipin Joshi and
                  Rajarshi Roy Chaudhuri and
                  Mehak Ashraf Mir and
                  Zubear Khan and
                  Avinas N. Shaji and
                  Madhura Bhattacharya and
                  Anup T. Vitthal and
                  Mayank Shrivastava},
  title        = {Signatures of Positive Gate Over-Drive Induced Hole Trap Generation
                  and its Impact on p-GaN Gate Stack Instability in AlGaN/GaN HEMTs},
  booktitle    = {{IEEE} International Reliability Physics Symposium, {IRPS} 2023, Monterey,
                  CA, USA, March 26-30, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IRPS48203.2023.10117793},
  doi          = {10.1109/IRPS48203.2023.10117793},
  timestamp    = {Wed, 24 May 2023 09:43:44 +0200},
  biburl       = {https://dblp.org/rec/conf/irps/MalikJCMKSBVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/SenC23,
  author       = {Ovishake Sen and
                  Baibhab Chatterjee},
  title        = {Invited: Ring-Oscillator Physical Unclonable Function {(RO-PUF)} Based
                  {PRBS} Generation as a Device Signature in Distributed Brain Implants},
  booktitle    = {66th {IEEE} International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2023, Tempe, AZ, USA, August 6-9, 2023},
  pages        = {439--443},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MWSCAS57524.2023.10405893},
  doi          = {10.1109/MWSCAS57524.2023.10405893},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwscas/SenC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01315,
  author       = {Pere D{\'{\i}}az Lozano and
                  Toni Lozano Bag{\'{e}}n and
                  Josep Vives},
  title        = {Neural SDEs for Conditional Time Series Generation and the Signature-Wasserstein-1
                  metric},
  journal      = {CoRR},
  volume       = {abs/2301.01315},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01315},
  doi          = {10.48550/ARXIV.2301.01315},
  eprinttype    = {arXiv},
  eprint       = {2301.01315},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01315.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-01475,
  author       = {Teddy Lazebnik and
                  Liron Simon Keren},
  title        = {Cancer-inspired Genomics Mapper Model for the Generation of Synthetic
                  {DNA} Sequences with Desired Genomics Signatures},
  journal      = {CoRR},
  volume       = {abs/2305.01475},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.01475},
  doi          = {10.48550/ARXIV.2305.01475},
  eprinttype    = {arXiv},
  eprint       = {2305.01475},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-01475.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-05775,
  author       = {Ovishake Sen and
                  Baibhab Chatterjee},
  title        = {Modified Ring-Oscillator Physical Unclonable Function {(RO-PUF)} based
                  {PRBS} Generation as a Device Signature in Distributed Brain Implants},
  journal      = {CoRR},
  volume       = {abs/2305.05775},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.05775},
  doi          = {10.48550/ARXIV.2305.05775},
  eprinttype    = {arXiv},
  eprint       = {2305.05775},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-05775.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetc/ThompsonW22,
  author       = {David Thompson and
                  Haibo Wang},
  title        = {Integrated Power Signature Generation Circuit for IoT Abnormality
                  Detection},
  journal      = {{ACM} J. Emerg. Technol. Comput. Syst.},
  volume       = {18},
  number       = {1},
  pages        = {5:1--5:13},
  year         = {2022},
  url          = {https://doi.org/10.1145/3460476},
  doi          = {10.1145/3460476},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jetc/ThompsonW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coolchips/MasadaNI22,
  author       = {Kaoru Masada and
                  Ryohei Nakayama and
                  Makoto Ikeda},
  title        = {Hardware Acceleration of Aggregate Signature Generation and Authentication
                  by {BLS} Signature over {BLS12-381} curve},
  booktitle    = {{IEEE} Symposium in Low-Power and High-Speed Chips, {COOL} {CHIPS}
                  2022, Tokyo, Japan, April 20-22, 2022},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/COOLCHIPS54332.2022.9772706},
  doi          = {10.1109/COOLCHIPS54332.2022.9772706},
  timestamp    = {Mon, 23 May 2022 16:36:20 +0200},
  biburl       = {https://dblp.org/rec/conf/coolchips/MasadaNI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/ShiWL22,
  author       = {Zhixin Shi and
                  Xiangyu Wang and
                  Pengcheng Liu},
  title        = {{NBP-MS:} Malware Signature Generation Based on Network Behavior Profiling},
  booktitle    = {26th International Conference on Pattern Recognition, {ICPR} 2022,
                  Montreal, QC, Canada, August 21-25, 2022},
  pages        = {1865--1870},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICPR56361.2022.9956412},
  doi          = {10.1109/ICPR56361.2022.9956412},
  timestamp    = {Thu, 01 Dec 2022 13:56:03 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/ShiWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChandrasekaranT21,
  author       = {Lakshmi Chandrasekaran and
                  Karuppuswamy Thenmozhi and
                  John Bosco Balaguru Rayappan and
                  Rengarajan Amirtharajan},
  title        = {Genetic and chaotic signatures in offspring - an encrypted generation
                  of image family},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {6},
  pages        = {8581--8609},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-020-09978-0},
  doi          = {10.1007/S11042-020-09978-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChandrasekaranT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/DuHH21,
  author       = {Min Du and
                  Wenjun Hu and
                  William Hewlett},
  editor       = {Gianluca Demartini and
                  Guido Zuccon and
                  J. Shane Culpepper and
                  Zi Huang and
                  Hanghang Tong},
  title        = {AutoCombo: Automatic Malware Signature Generation Through Combination
                  Rule Mining},
  booktitle    = {{CIKM} '21: The 30th {ACM} International Conference on Information
                  and Knowledge Management, Virtual Event, Queensland, Australia, November
                  1 - 5, 2021},
  pages        = {3777--3786},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3459637.3481896},
  doi          = {10.1145/3459637.3481896},
  timestamp    = {Tue, 16 Aug 2022 23:04:38 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/DuHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmc2/Ikematsu21,
  author       = {Yasuhiko Ikematsu},
  editor       = {Debasis Giri and
                  Kim{-}Kwang Raymond Choo and
                  Saminathan Ponnusamy and
                  Weizhi Meng and
                  Sedat Akleylek and
                  Santi Prasad Maity},
  title        = {A Study on Randomness Used in Signature Generation of {UOV}},
  booktitle    = {Proceedings of the Seventh International Conference on Mathematics
                  and Computing - {ICMC} 2021, Shibpur, India,},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1412},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-6890-6\_4},
  doi          = {10.1007/978-981-16-6890-6\_4},
  timestamp    = {Wed, 16 Mar 2022 11:12:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icmc2/Ikematsu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/AlnujaimK21,
  author       = {Ibrahim Alnujaim and
                  Youngwook Kim},
  title        = {Application of Conditional Generative Adversarial Networks for Generation
                  of Micro-Doppler Signatures of Different Aspect Angles},
  booktitle    = {{IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS}
                  2021, Brussels, Belgium, July 11-16, 2021},
  pages        = {5056--5058},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IGARSS47720.2021.9553743},
  doi          = {10.1109/IGARSS47720.2021.9553743},
  timestamp    = {Tue, 19 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/AlnujaimK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/SongHWTW21,
  author       = {Yifeng Song and
                  Xiao Hu and
                  Wenhao Wang and
                  Jing Tian and
                  Zhongfeng Wang},
  title        = {High-Speed and Scalable {FPGA} Implementation of the Key Generation
                  for the Leighton-Micali Signature Protocol},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021,
                  Daegu, South Korea, May 22-28, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCAS51556.2021.9401177},
  doi          = {10.1109/ISCAS51556.2021.9401177},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/SongHWTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/KapoorFQ21,
  author       = {Maya Kapoor and
                  Garrett Fuchs and
                  Jonathan Quance},
  editor       = {Mauro Andreolini and
                  Mirco Marchetti and
                  Dimiter R. Avresky},
  title        = {RExACtor: Automatic Regular Expression Signature Generation for Stateless
                  Packet Inspection},
  booktitle    = {20th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2021, Boston, MA, USA, November 23-26, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/NCA53618.2021.9685959},
  doi          = {10.1109/NCA53618.2021.9685959},
  timestamp    = {Tue, 08 Feb 2022 10:29:09 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/KapoorFQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KosugeT21,
  author       = {Haruhisa Kosuge and
                  Hidema Tanaka},
  editor       = {Riham AlTawy and
                  Andreas H{\"{u}}lsing},
  title        = {Simple and Memory-Efficient Signature Generation of {\textdollar}{\textbackslash}mathrm
                  \{XMSS\{MT\}\}{\textdollar}},
  booktitle    = {Selected Areas in Cryptography - 28th International Conference, {SAC}
                  2021, Virtual Event, September 29 - October 1, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13203},
  pages        = {377--397},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-99277-4\_18},
  doi          = {10.1007/978-3-030-99277-4\_18},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KosugeT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/FengHWWH20,
  author       = {Qi Feng and
                  Debiao He and
                  Huaqun Wang and
                  Ding Wang and
                  Xinyi Huang},
  title        = {Multi-party key generation protocol for the identity-based signature
                  scheme in the {IEEE} {P1363} standard for public key cryptography},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {724--732},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2020.0096},
  doi          = {10.1049/IET-IFS.2020.0096},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/FengHWWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcat/ShinRIY20,
  author       = {Jungpil Shin and
                  Md. Abdur Rahim and
                  Md. Rashedul Islam and
                  Keun Soo Yun},
  title        = {A novel approach of cursive signature generation for personal identity},
  journal      = {Int. J. Comput. Appl. Technol.},
  volume       = {62},
  number       = {4},
  pages        = {384--394},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJCAT.2020.107423},
  doi          = {10.1504/IJCAT.2020.107423},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcat/ShinRIY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgi/ChenHLAH20,
  author       = {Ting Chen and
                  Haiqing He and
                  Dajun Li and
                  Puyang An and
                  Zhenyang Hui},
  title        = {Damage Signature Generation of Revetment Surface along Urban Rivers
                  Using UAV-Based Mapping},
  journal      = {{ISPRS} Int. J. Geo Inf.},
  volume       = {9},
  number       = {4},
  pages        = {283},
  year         = {2020},
  url          = {https://doi.org/10.3390/ijgi9040283},
  doi          = {10.3390/IJGI9040283},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgi/ChenHLAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/RuizLSV20,
  author       = {Victoria Ru{\'{\i}}z and
                  Ismael Linares and
                  {\'{A}}ngel S{\'{a}}nchez and
                  Jos{\'{e}} Francisco V{\'{e}}lez},
  title        = {Off-line handwritten signature verification using compositional synthetic
                  generation of signatures and Siamese Neural Networks},
  journal      = {Neurocomputing},
  volume       = {374},
  pages        = {30--41},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.neucom.2019.09.041},
  doi          = {10.1016/J.NEUCOM.2019.09.041},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/RuizLSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaiscr/ZalasinskiCLWP20,
  author       = {Marcin Zalasinski and
                  Krzysztof Cpalka and
                  Lukasz Laskowski and
                  Donald C. Wunsch and
                  Krzysztof Przybyszewski},
  title        = {An Algorithm for the Evolutionary-Fuzzy Generation of on-Line Signature
                  Hybrid Descriptors},
  journal      = {J. Artif. Intell. Soft Comput. Res.},
  volume       = {10},
  number       = {3},
  pages        = {173--187},
  year         = {2020},
  url          = {https://doi.org/10.2478/jaiscr-2020-0012},
  doi          = {10.2478/JAISCR-2020-0012},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaiscr/ZalasinskiCLWP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nar/StathiasTKVCFPT20,
  author       = {Vasileios Stathias and
                  John Paul Turner and
                  Amar Koleti and
                  Dusica Vidovic and
                  Daniel J. Cooper and
                  Mehdi Fazel{-}Najafabadi and
                  Marcin Pilarczyk and
                  Raymond Terryn and
                  Caty Chung and
                  Afoma Umeano and
                  Daniel J. B. Clarke and
                  Alexander Lachmann and
                  John Erol Evangelista and
                  Avi Ma'ayan and
                  Mario Medvedovic and
                  Stephan C. Sch{\"{u}}rer},
  title        = {{LINCS} Data Portal 2.0: next generation access point for perturbation-response
                  signatures},
  journal      = {Nucleic Acids Res.},
  volume       = {48},
  number       = {Database-Issue},
  pages        = {D431--D439},
  year         = {2020},
  url          = {https://doi.org/10.1093/nar/gkz1023},
  doi          = {10.1093/NAR/GKZ1023},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nar/StathiasTKVCFPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/KaurS20,
  author       = {Sanmeet Kaur and
                  Maninder Singh},
  title        = {Hybrid intrusion detection and signature generation using Deep Recurrent
                  Neural Networks},
  journal      = {Neural Comput. Appl.},
  volume       = {32},
  number       = {12},
  pages        = {7859--7877},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00521-019-04187-9},
  doi          = {10.1007/S00521-019-04187-9},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/KaurS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/NahmiasCNE20,
  author       = {Daniel Nahmias and
                  Aviad Cohen and
                  Nir Nissim and
                  Yuval Elovici},
  title        = {Deep feature transfer learning for trusted and automated malware signature
                  generation in private cloud environments},
  journal      = {Neural Networks},
  volume       = {124},
  pages        = {243--257},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.neunet.2020.01.003},
  doi          = {10.1016/J.NEUNET.2020.01.003},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nn/NahmiasCNE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/KimLH20,
  author       = {Gyu{-}Chol Kim and
                  Su{-}Chol Li and
                  Hak{-}Chol Hwang},
  title        = {Fast rebalanced {RSA} signature scheme with typical prime generation},
  journal      = {Theor. Comput. Sci.},
  volume       = {830-831},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.04.024},
  doi          = {10.1016/J.TCS.2020.04.024},
  timestamp    = {Wed, 03 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/KimLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/ZitarNHA20,
  author       = {Raed Abu Zitar and
                  Mirna Nachouki and
                  Hanan Hussain and
                  Farid Alzboun},
  editor       = {Qiang Zheng and
                  Xiaopeng Zheng and
                  Xiangfu Zhao and
                  Weiqing Yan and
                  Nan Zhang and
                  Lipo Wang},
  title        = {Recurrent Neural Networks for Signature Generation},
  booktitle    = {13th International Congress on Image and Signal Processing, BioMedical
                  Engineering and Informatics, {CISP-BMEI} 2020, Chengdu, China, October
                  17-19, 2020},
  pages        = {1093--1097},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CISP-BMEI51763.2020.9263638},
  doi          = {10.1109/CISP-BMEI51763.2020.9263638},
  timestamp    = {Fri, 30 Apr 2021 12:35:39 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/ZitarNHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/LongX20,
  author       = {Yihong Long and
                  Feng Xiong},
  title        = {Collaborative Generations Of Sm9 Private Key And Digital Signature
                  Using Homomorphic Encryption},
  booktitle    = {5th International Conference on Computer and Communication Systems,
                  {ICCCS} 2020, Shanghai, China, May 15-18, 2020},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCS49078.2020.9118464},
  doi          = {10.1109/ICCCS49078.2020.9118464},
  timestamp    = {Mon, 02 Aug 2021 08:40:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccoms/LongX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kokoris-KogiasM20,
  author       = {Eleftherios Kokoris{-}Kogias and
                  Dahlia Malkhi and
                  Alexander Spiegelman},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Asynchronous Distributed Key Generation for Computationally-Secure
                  Randomness, Consensus, and Threshold Signatures},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1751--1767},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423364},
  doi          = {10.1145/3372297.3423364},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Kokoris-KogiasM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/WeirSD20,
  author       = {Nathaniel Weir and
                  Jo{\~{a}}o Sedoc and
                  Benjamin Van Durme},
  editor       = {Bonnie Webber and
                  Trevor Cohn and
                  Yulan He and
                  Yang Liu},
  title        = {{COD3S:} Diverse Generation with Discrete Semantic Signatures},
  booktitle    = {Proceedings of the 2020 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2020, Online, November 16-20, 2020},
  pages        = {5199--5211},
  publisher    = {Association for Computational Linguistics},
  year         = {2020},
  url          = {https://doi.org/10.18653/v1/2020.emnlp-main.421},
  doi          = {10.18653/V1/2020.EMNLP-MAIN.421},
  timestamp    = {Wed, 23 Mar 2022 10:11:55 +0100},
  biburl       = {https://dblp.org/rec/conf/emnlp/WeirSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewdts/ChesnokovKCSCP20,
  author       = {Nikita I. Chesnokov and
                  Denis A. Korochentsev and
                  Larissa V. Cherckesova and
                  Olga A. Safaryan and
                  Vladislav E. Chumakov and
                  Irina A. Pilipenko},
  title        = {Software Development of Electronic Digital Signature Generation at
                  Institution Electronic Document Circulation},
  booktitle    = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna,
                  Bulgaria, September 4-7, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EWDTS50664.2020.9224967},
  doi          = {10.1109/EWDTS50664.2020.9224967},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ewdts/ChesnokovKCSCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/LongX20,
  author       = {Yihong Long and
                  Feng Xiong},
  title        = {Secret Sharing Based {BLMQ} Signature Generation},
  booktitle    = {{ICCSP} 2020: 4th International Conference on Cryptography, Security
                  and Privacy, Nanjing, China, January 10-12, 2020},
  pages        = {6--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377644.3377655},
  doi          = {10.1145/3377644.3377655},
  timestamp    = {Tue, 05 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/LongX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icct/YeL20,
  author       = {Wenlan Ye and
                  Yihong Long},
  title        = {Two Party Generation of {SM9} Digital Signature},
  booktitle    = {20th {IEEE} International Conference on Communication Technology,
                  {ICCT} 2020, Nanning, China, October 28-31, 2020},
  pages        = {1556--1560},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCT50939.2020.9295863},
  doi          = {10.1109/ICCT50939.2020.9295863},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icct/YeL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/ThompsonSW20,
  author       = {David E. Thompson and
                  Md Kamruzzaman Shuvo and
                  Haibo Wang},
  title        = {Digital {LDO} Based Power Signature Generation Circuit for IoT Security},
  booktitle    = {63rd {IEEE} International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2020, Springfield, MA, USA, August 9-12, 2020},
  pages        = {1076--1079},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/MWSCAS48704.2020.9184550},
  doi          = {10.1109/MWSCAS48704.2020.9184550},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mwscas/ThompsonSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KajitaONT20,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Short Lattice Signatures in the Standard Model with Efficient Tag
                  Generation},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_5},
  doi          = {10.1007/978-3-030-62576-4\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/KajitaONT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FengHLLC20,
  author       = {Qi Feng and
                  Debiao He and
                  Min Luo and
                  Zengxiang Li and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection
                  and Applications in Cryptocurrency},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {137--147},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00031},
  doi          = {10.1109/TRUSTCOM50675.2020.00031},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FengHLLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangTCXLX20,
  author       = {Runzi Zhang and
                  Mingkai Tong and
                  Lei Chen and
                  Jianxin Xue and
                  Wenmao Liu and
                  Feng Xie},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {CMIRGen: Automatic Signature Generation Algorithm for Malicious Network
                  Traffic},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {736--743},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00101},
  doi          = {10.1109/TRUSTCOM50675.2020.00101},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangTCXLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-02882,
  author       = {Nathaniel Weir and
                  Jo{\~{a}}o Sedoc and
                  Benjamin Van Durme},
  title        = {{COD3S:} Diverse Generation with Discrete Semantic Signatures},
  journal      = {CoRR},
  volume       = {abs/2010.02882},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.02882},
  eprinttype    = {arXiv},
  eprint       = {2010.02882},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-02882.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eecs/JagadeeshDBR19,
  author       = {Kokila Jagadeesh and
                  Arjun Murali Das and
                  B. Shameedha Begum and
                  Natarajan Ramasubramanian},
  title        = {Hardware Signature Generation Using a Hybrid {PUF} and {FSM} Model
                  for an SoC Architecture},
  journal      = {Period. Polytech. Electr. Eng. Comput. Sci.},
  volume       = {63},
  number       = {4},
  pages        = {244--253},
  year         = {2019},
  url          = {https://doi.org/10.3311/ppee.13424},
  doi          = {10.3311/PPEE.13424},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eecs/JagadeeshDBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ItoK19,
  author       = {Hiroshi Ito and
                  Tadashi Kasezawa},
  title        = {Permutation-Based Signature Generation for Spread-Spectrum Video Watermarking},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {1},
  pages        = {31--40},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2018MUP0005},
  doi          = {10.1587/TRANSINF.2018MUP0005},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ItoK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChangLLGP19,
  author       = {Chin{-}Chen Chang and
                  Wai{-}Kong Lee and
                  Yanjun Liu and
                  Bok{-}Min Goi and
                  Raphael C.{-}W. Phan},
  title        = {Signature Gateway: Offloading Signature Generation to IoT Gateway
                  Accelerated by {GPU}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4448--4461},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2881425},
  doi          = {10.1109/JIOT.2018.2881425},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChangLLGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ZhaoYZ19,
  author       = {Pu Zhao and
                  Jia Yu and
                  Hanlin Zhang},
  title        = {Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving
                  Public Cloud Storage Auditing},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {35},
  number       = {3},
  pages        = {635--650},
  year         = {2019},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=168\_2242},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ZhaoYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/BaeKA19,
  author       = {Tae{-}Wuk Bae and
                  Young{-}Choon Kim and
                  Sang{-}Ho Ahn},
  title        = {{IR} Composite Image Generation by Wavelength Band Based on Temperature
                  Synthesis Estimated from {IR} Target Signature and Background Scene},
  journal      = {J. Sensors},
  volume       = {2019},
  pages        = {9423976:1--9423976:17},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9423976},
  doi          = {10.1155/2019/9423976},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/BaeKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ats/HiramotoOT19,
  author       = {Yushiro Hiramoto and
                  Satoshi Ohtake and
                  Hiroshi Takahashi},
  title        = {A Built-In Self-Diagnostic Mechanism for Delay Faults Based on Self-Generation
                  of Expected Signatures},
  booktitle    = {28th {IEEE} Asian Test Symposium, {ATS} 2019, Kolkata, India, December
                  10-13, 2019},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ATS47505.2019.000-4},
  doi          = {10.1109/ATS47505.2019.000-4},
  timestamp    = {Tue, 14 Jan 2020 13:20:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ats/HiramotoOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LongC19,
  author       = {Yihong Long and
                  Minyang Cheng},
  title        = {Secret Sharing Based {SM2} Digital Signature Generation using Homomorphic
                  Encryption},
  booktitle    = {15th International Conference on Computational Intelligence and Security,
                  {CIS} 2019, Macao, SAR, China, December 13-16, 2019},
  pages        = {252--256},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CIS.2019.00060},
  doi          = {10.1109/CIS.2019.00060},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LongC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ShanYGJWL19,
  author       = {Weijun Shan and
                  Jun Yu and
                  Limin Guo and
                  Kun Jiang and
                  Lihui Wang and
                  Qing Li},
  title        = {A Horizontal Attack on {SM9} Signature Generation},
  booktitle    = {15th International Conference on Computational Intelligence and Security,
                  {CIS} 2019, Macao, SAR, China, December 13-16, 2019},
  pages        = {306--309},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CIS.2019.00071},
  doi          = {10.1109/CIS.2019.00071},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/ShanYGJWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/Zhdanov19,
  author       = {Alexander Zhdanov},
  title        = {Generation of Static YARA-Signatures Using Genetic Algorithm},
  booktitle    = {2019 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {220--228},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSPW.2019.00031},
  doi          = {10.1109/EUROSPW.2019.00031},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/Zhdanov19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnss/QiuLW19,
  author       = {Jian Qiu and
                  Hengjian Li and
                  Xiyu Wang},
  editor       = {Robin Doss and
                  Selwyn Piramuthu and
                  Wei Zhou},
  title        = {Cancelable Palmprint Feature Generation Method Based on Minimum Signature},
  booktitle    = {Future Network Systems and Security - 5th International Conference,
                  {FNSS} 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1113},
  pages        = {118--127},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34353-8\_8},
  doi          = {10.1007/978-3-030-34353-8\_8},
  timestamp    = {Fri, 27 Mar 2020 08:58:51 +0100},
  biburl       = {https://dblp.org/rec/conf/fnss/QiuLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaiic/ChoiKPC19,
  author       = {Kiho Choi and
                  Hyeongrae Kim and
                  Daejin Park and
                  Jeonghun Cho},
  title        = {Automatic Multi-Thread Code Generation for Monitoring Signature-based
                  Control Flow},
  booktitle    = {International Conference on Artificial Intelligence in Information
                  and Communication, {ICAIIC} 2019, Okinawa, Japan, February 11-13,
                  2019},
  pages        = {28--33},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICAIIC.2019.8668997},
  doi          = {10.1109/ICAIIC.2019.8668997},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icaiic/ChoiKPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbk/ZhangHHCT19,
  author       = {Yuanming Zhang and
                  Ting Han and
                  Zelin Hao and
                  Yu Cao and
                  Jing Tao},
  editor       = {Yunjun Gao and
                  Ralf M{\"{o}}ller and
                  Xindong Wu and
                  Ramamohanarao Kotagiri},
  title        = {An Efficient Application Traffic Signature Generation System},
  booktitle    = {2019 {IEEE} International Conference on Big Knowledge, {ICBK} 2019,
                  Beijing, China, November 10-11, 2019},
  pages        = {341--347},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICBK.2019.00053},
  doi          = {10.1109/ICBK.2019.00053},
  timestamp    = {Tue, 21 Jan 2020 16:26:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icbk/ZhangHHCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/NahmiasCNE19,
  author       = {Daniel Nahmias and
                  Aviad Cohen and
                  Nir Nissim and
                  Yuval Elovici},
  title        = {TrustSign: Trusted Malware Signature Generation in Private Clouds
                  Using Deep Feature Transfer Learning},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
                  Hungary, July 14-19, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IJCNN.2019.8851841},
  doi          = {10.1109/IJCNN.2019.8851841},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/NahmiasCNE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-00154,
  author       = {Saeed Valizadeh and
                  Marten van Dijk},
  title        = {On the Convergence Rates of Learning-based Signature Generation Schemes
                  to Contain Self-propagating Malware},
  journal      = {CoRR},
  volume       = {abs/1905.00154},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.00154},
  eprinttype    = {arXiv},
  eprint       = {1905.00154},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-00154.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AtzeniDMSST18,
  author       = {Andrea S. Atzeni and
                  Fernando Diaz and
                  Andrea Marcelli and
                  Antonio S{\'{a}}nchez and
                  Giovanni Squillero and
                  Alberto Paolo Tonda},
  title        = {Countering Android Malware: {A} Scalable Semi-Supervised Approach
                  for Family-Signature Generation},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {59540--59556},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2874502},
  doi          = {10.1109/ACCESS.2018.2874502},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AtzeniDMSST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/YiN18,
  author       = {Haibo Yi and
                  Zhe Nie},
  title        = {High-speed hardware architecture for implementations of multivariate
                  signature generations on FPGAs},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2018},
  pages        = {93},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13638-018-1117-2},
  doi          = {10.1186/S13638-018-1117-2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/YiN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SugiyamaAI18,
  author       = {Shotaro Sugiyama and
                  Hiromitsu Awano and
                  Makoto Ikeda},
  title        = {Low Latency 256-bit {\textdollar}mathbb\{F\}{\_}p{\textdollar} {ECDSA}
                  Signature Generation Crypto Processor},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {12},
  pages        = {2290--2296},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.2290},
  doi          = {10.1587/TRANSFUN.E101.A.2290},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SugiyamaAI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/PengT18,
  author       = {Zhiniang Peng and
                  Shaohua Tang},
  title        = {Circulant {UOV:} a new {UOV} variant with shorter private key and
                  faster signature generation},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {3},
  pages        = {1376--1395},
  year         = {2018},
  url          = {https://doi.org/10.3837/tiis.2018.03.022},
  doi          = {10.3837/TIIS.2018.03.022},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/PengT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/SijaSK18,
  author       = {Baraka D. Sija and
                  Kyu{-}Seok Shim and
                  Myung{-}Sup Kim},
  title        = {Automatic Payload Signature Generation for Accurate Identification
                  of Internet Applications and Application Services},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {4},
  pages        = {1572--1593},
  year         = {2018},
  url          = {https://doi.org/10.3837/tiis.2018.04.010},
  doi          = {10.3837/TIIS.2018.04.010},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/SijaSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/MengT18,
  author       = {Lei Meng and
                  Lin Teng},
  title        = {Karhunen Loeve Transform-based Online Handwritten Signature Scheme
                  via Dynamic Bit Allocation Method and Naive Bayes for Biometric Key
                  Generation},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {9},
  number       = {4},
  pages        = {896--903},
  year         = {2018},
  url          = {http://bit.kuas.edu.tw/\&\#126;jihmsp/2018/vol9/JIH-MSP-2018-04-012.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/MengT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwe/TangLC18,
  author       = {Yazhe Tang and
                  Xun Li and
                  Lishui Chen},
  title        = {{STAFF:} Automated Signature Generationfor Fine-Grained FunctionTraffic
                  Identification},
  journal      = {J. Web Eng.},
  volume       = {17},
  number       = {5},
  pages        = {71--94},
  year         = {2018},
  url          = {https://doi.org/10.13052/jwe1540-9589.1753},
  doi          = {10.13052/JWE1540-9589.1753},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jwe/TangLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LeeKLCYLL18,
  author       = {Suchul Lee and
                  Sungho Kim and
                  Sungil Lee and
                  Jaehyuk Choi and
                  Hanjun Yoon and
                  Dohoon Lee and
                  Jun{-}Rak Lee},
  title        = {LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet
                  Allocation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {771--783},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2609907},
  doi          = {10.1109/TDSC.2016.2609907},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LeeKLCYLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asscc/SugiyamaAI18,
  author       = {Shotaro Sugiyama and
                  Hiromitsu Awano and
                  Makoto Ikeda},
  title        = {31.3 {\(\mu\)}s/Signature-Generation 256-bit {\unicode{54589}}p {ECDSA}
                  Cryptoprocessor},
  booktitle    = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2018, Tainan,
                  Taiwan, November 5-7, 2018},
  pages        = {153--156},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ASSCC.2018.8579287},
  doi          = {10.1109/ASSCC.2018.8579287},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asscc/SugiyamaAI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlhanahnahLYZC18,
  author       = {Mohannad Alhanahnah and
                  Qicheng Lin and
                  Qiben Yan and
                  Ning Zhang and
                  Zhenxiang Chen},
  title        = {Efficient Signature Generation for Classifying Cross-Architecture
                  IoT Malware},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433203},
  doi          = {10.1109/CNS.2018.8433203},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlhanahnahLYZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/OzdilEDO18,
  author       = {Omer Ozdil and
                  Yunus Emre Esin and
                  Berkan Demirel and
                  Safak Ozturk},
  title        = {Representative Signature Generation for Plant Detection in Hyperspectral
                  Images},
  booktitle    = {2018 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2018, Valencia, Spain, July 22-27, 2018},
  pages        = {2709--2712},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IGARSS.2018.8517344},
  doi          = {10.1109/IGARSS.2018.8517344},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/OzdilEDO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iseaisap/NaderiVCPA18,
  author       = {Hassan Naderi and
                  P. Vinod and
                  Mauro Conti and
                  Saeed Parsa and
                  Mohammad Hadi Alaeiyan},
  editor       = {Sukumar Nandi and
                  Devesh Jinwala and
                  Virendra Singh and
                  Vijay Laxmi and
                  Manoj Singh Gaur and
                  Parvez Faruki},
  title        = {Malware Signature Generation Using Locality Sensitive Hashing},
  booktitle    = {Security and Privacy - Second {ISEA} International Conference, {ISEA-ISAP}
                  2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {939},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-7561-3\_9},
  doi          = {10.1007/978-981-13-7561-3\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iseaisap/NaderiVCPA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PengT17,
  author       = {Zhiniang Peng and
                  Shaohua Tang},
  title        = {Circulant Rainbow: {A} New Rainbow Variant With Shorter Private Key
                  and Faster Signature Generation},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {11877--11886},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2717279},
  doi          = {10.1109/ACCESS.2017.2717279},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PengT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ShimYLK17,
  author       = {Kyu{-}Seok Shim and
                  Sung{-}Ho Yoon and
                  Su{-}Kang Lee and
                  Myung{-}Sup Kim},
  title        = {SigBox: Automatic Signature Generation Method for Fine-grained Traffic
                  Identification},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {2},
  pages        = {537--569},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=155\_2012},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ShimYLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocs/Niewiadomska-Szynkiewicz17,
  author       = {Ewa Niewiadomska{-}Szynkiewicz and
                  Adam Kozakiewicz},
  title        = {Design and evaluation of a system for network threat signatures generation},
  journal      = {J. Comput. Sci.},
  volume       = {22},
  pages        = {187--197},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jocs.2017.05.006},
  doi          = {10.1016/J.JOCS.2017.05.006},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocs/Niewiadomska-Szynkiewicz17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/CabreraFES17,
  author       = {Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Miguel A. Ferrer and
                  George S. Eskander and
                  Robert Sabourin},
  title        = {Generation of Duplicated Off-Line Signature Images for Verification
                  Systems},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {39},
  number       = {5},
  pages        = {951--964},
  year         = {2017},
  url          = {https://doi.org/10.1109/TPAMI.2016.2560810},
  doi          = {10.1109/TPAMI.2016.2560810},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/CabreraFES17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/ShahriarB17,
  author       = {Hossain Shahriar and
                  William Bond},
  title        = {Towards an Attack Signature Generation Framework for Intrusion Detection
                  Systems},
  booktitle    = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
                  15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf
                  on Big Data Intelligence and Computing and Cyber Science and Technology
                  Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA,
                  November 6-10, 2017},
  pages        = {597--603},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.106},
  doi          = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.106},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/ShahriarB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/BuneevaR17,
  author       = {Nadezda Buneeva and
                  Andreas Reinhardt},
  title        = {{AMBAL:} Realistic load signature generation for load disaggregation
                  performance evaluation},
  booktitle    = {2017 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2017, Dresden, Germany, October 23-27, 2017},
  pages        = {443--448},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SmartGridComm.2017.8340657},
  doi          = {10.1109/SMARTGRIDCOMM.2017.8340657},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/BuneevaR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-08336,
  author       = {Eli David and
                  Nathan S. Netanyahu},
  title        = {DeepSign: Deep Learning for Automatic Malware Signature Generation
                  and Classification},
  journal      = {CoRR},
  volume       = {abs/1711.08336},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.08336},
  eprinttype    = {arXiv},
  eprint       = {1711.08336},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-08336.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShaoKVP16,
  author       = {Min Shao and
                  Min Sik Kim and
                  Victor C. Valgenti and
                  Jungkeun Park},
  title        = {Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based
                  Network Intrusion Detection Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {8},
  pages        = {2090--2099},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015EDP7483},
  doi          = {10.1587/TRANSINF.2015EDP7483},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShaoKVP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TamuraI16,
  author       = {Masato Tamura and
                  Makoto Ikeda},
  title        = {Montgomery Multiplier Design for {ECDSA} Signature Generation Processor},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {12},
  pages        = {2444--2452},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.2444},
  doi          = {10.1587/TRANSFUN.E99.A.2444},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TamuraI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/SalazarTP16,
  author       = {Jos{\'{e}} Luis Salazar and
                  Jos{\'{e}} Luis Tornos and
                  Joan Josep Piles},
  title        = {Efficient ways of prime number generation for ring signatures},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {33--36},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0547},
  doi          = {10.1049/IET-IFS.2014.0547},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/SalazarTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asscc/TamuraI16,
  author       = {Masato Tamura and
                  Makoto Ikeda},
  title        = {1.68{\(\mu\)}J/signature-generation 256-bit {ECDSA} over GF(p) signature
                  generator for IoT devices},
  booktitle    = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2016, Toyama,
                  Japan, November 7-9, 2016},
  pages        = {341--344},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ASSCC.2016.7844205},
  doi          = {10.1109/ASSCC.2016.7844205},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/asscc/TamuraI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/JupinSD16,
  author       = {Joseph Jupin and
                  Justin Y. Shi and
                  Eduard C. Dragut},
  editor       = {James Joshi and
                  George Karypis and
                  Ling Liu and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yinglong Xia and
                  Weijia Xu and
                  Aki{-}Hiro Sato and
                  Sudarsan Rachuri and
                  Lyle H. Ungar and
                  Philip S. Yu and
                  Rama Govindaraju and
                  Toyotaro Suzumura},
  title        = {{PSH:} {A} probabilistic signature hash method with hash neighborhood
                  candidate generation for fast edit-distance string comparison on big
                  data},
  booktitle    = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016),
                  Washington DC, USA, December 5-8, 2016},
  pages        = {122--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigData.2016.7840596},
  doi          = {10.1109/BIGDATA.2016.7840596},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/JupinSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BohmerR16,
  author       = {Kristof B{\"{o}}hmer and
                  Stefanie Rinderle{-}Ma},
  editor       = {Rainer Schmidt and
                  Wided Gu{\'{e}}dria and
                  Ilia Bider and
                  S{\'{e}}rgio Guerreiro},
  title        = {Automatic Signature Generation for Anomaly Detection in Business Process
                  Instance Data},
  booktitle    = {Enterprise, Business-Process and Information Systems Modeling - 17th
                  International Conference, {BPMDS} 2016, 21st International Conference,
                  {EMMSAD} 2016, Held at CAiSE 2016, Ljubljana, Slovenia, June 13-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {248},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39429-9\_13},
  doi          = {10.1007/978-3-319-39429-9\_13},
  timestamp    = {Fri, 19 Mar 2021 08:43:31 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/BohmerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/SowaSYM16,
  author       = {Taiki Sowa and
                  Suguru Sunada and
                  Yasushi Yamazaki and
                  Takeru Miyazaki},
  title        = {Biometric Bit String Generation from Handwritten Signatures on Smart
                  Device},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {662--665},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0118},
  doi          = {10.1109/CANDAR.2016.0118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/SowaSYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/Kim0X16,
  author       = {Jongik Kim and
                  Chen Li and
                  Xiaohui Xie},
  title        = {Hobbes3: Dynamic generation of variable-length signatures for efficient
                  approximate subsequence mappings},
  booktitle    = {32nd {IEEE} International Conference on Data Engineering, {ICDE} 2016,
                  Helsinki, Finland, May 16-20, 2016},
  pages        = {169--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICDE.2016.7498238},
  doi          = {10.1109/ICDE.2016.7498238},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/Kim0X16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfhr/CabreraCFBMCAP16,
  author       = {Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Sukalpa Chanda and
                  Miguel A. Ferrer and
                  Chayan Kumar Banerjee and
                  Anirban Majumdar and
                  Cristina Carmona{-}Duarte and
                  Parikshit Acharya and
                  Umapada Pal},
  title        = {Multiple Generation of Bengali Static Signatures},
  booktitle    = {15th International Conference on Frontiers in Handwriting Recognition,
                  {ICFHR} 2016, Shenzhen, China, October 23-26, 2016},
  pages        = {42--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICFHR.2016.0021},
  doi          = {10.1109/ICFHR.2016.0021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfhr/CabreraCFBMCAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/ChoiLCKK16a,
  author       = {Sunoh Choi and
                  Jooyoung Lee and
                  Yangseo Choi and
                  Jonghyun Kim and
                  Ikkyun Kim},
  title        = {Hierarchical network signature clustering and generation},
  booktitle    = {International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21,
                  2016},
  pages        = {1191--1193},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICTC.2016.7763403},
  doi          = {10.1109/ICTC.2016.7763403},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ictc/ChoiLCKK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwci/ChakrabortyRRU16,
  author       = {Narayan Ranjan Chakraborty and
                  Muhammad Taifur Rahman and
                  Md. Ekhlasur Rahman and
                  Mohammad Shorif Uddin},
  title        = {Generation and verification of digital signature with two factor authentication},
  booktitle    = {2016 International Workshop on Computational Intelligence {(IWCI}
                  2016), Dhaka, Bangladesh, December 12-13, 2016},
  pages        = {131--135},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IWCI.2016.7860353},
  doi          = {10.1109/IWCI.2016.7860353},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/iwci/ChakrabortyRRU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/Vasilomanolakis16a,
  author       = {Emmanouil Vasilomanolakis and
                  Shreyas Srinivasa and
                  Carlos Garcia Cordero and
                  Max M{\"{u}}hlh{\"{a}}user},
  editor       = {Sema Oktug and
                  Mehmet Ulema and
                  Cicek Cavdar and
                  Lisandro Zambenedetti Granville and
                  Carlos Raniery Paula dos Santos},
  title        = {Multi-stage attack detection and signature generation with {ICS} honeypots},
  booktitle    = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS}
                  2016, Istanbul, Turkey, April 25-29, 2016},
  pages        = {1227--1232},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NOMS.2016.7502992},
  doi          = {10.1109/NOMS.2016.7502992},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/Vasilomanolakis16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rait/BhowmickSMB16,
  author       = {Shib Sankar Bhowmick and
                  Indrajit Saha and
                  Ujjwal Maulik and
                  Debotosh Bhattacharjee},
  title        = {Identification of miRNA signature using Next-Generation Sequencing
                  data of prostate cancer},
  booktitle    = {2016 3rd International Conference on Recent Advances in Information
                  Technology (RAIT), Dhanbad, India, March 3-5, 2016},
  pages        = {528--533},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RAIT.2016.7507956},
  doi          = {10.1109/RAIT.2016.7507956},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rait/BhowmickSMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcloud/ShangPLL16,
  author       = {Tao Shang and
                  Tianli Peng and
                  Qi Lei and
                  Jianwei Liu},
  title        = {Homomorphic Signature for Generation-based Network Coding},
  booktitle    = {2016 {IEEE} International Conference on Smart Cloud, SmartCloud 2016,
                  New York, NY, USA, November 18-20, 2016},
  pages        = {269--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SmartCloud.2016.59},
  doi          = {10.1109/SMARTCLOUD.2016.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartcloud/ShangPLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/WangW16,
  author       = {Jie Wang and
                  Jie Wu},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jos{\'{e}} M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {A Novel Signature Generation Approach in Noisy Environments for Detecting
                  Polymorphic Worm},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie,
                  China, November 16-18, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10066},
  pages        = {109--121},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49148-6\_10},
  doi          = {10.1007/978-3-319-49148-6\_10},
  timestamp    = {Wed, 24 Apr 2024 14:55:54 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Garcia-TeodoroD15,
  author       = {Pedro Garc{\'{\i}}a{-}Teodoro and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and
                  Juan E. Tapiador and
                  Rolando Salazar{-}Hern{\'{a}}ndez},
  title        = {Automatic generation of {HTTP} intrusion signatures by selective identification
                  of anomalies},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {159--174},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.09.007},
  doi          = {10.1016/J.COSE.2015.09.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Garcia-TeodoroD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Horng15,
  author       = {Gwoboa Horng},
  title        = {Accelerating {DSA} Signature Generation},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {121--125},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915262},
  doi          = {10.1080/01611194.2014.915262},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Horng15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijssc/KuzunoT15,
  author       = {Hiroki Kuzuno and
                  Satoshi Tonami},
  title        = {Detection of sensitive information leakage in Android applications
                  using signature generation},
  journal      = {Int. J. Space Based Situated Comput.},
  volume       = {5},
  number       = {1},
  pages        = {53--62},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSSC.2015.067998},
  doi          = {10.1504/IJSSC.2015.067998},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijssc/KuzunoT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HaoWLR15,
  author       = {Sun Hao and
                  Wen Wang and
                  Huabiao Lu and
                  Peige Ren},
  title        = {AutoMal: automatic clustering and signature generation for malwares
                  based on the network flow},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1845--1854},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1029},
  doi          = {10.1002/SEC.1029},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HaoWLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/TanT15,
  author       = {Yang Tan and
                  Shaohua Tang},
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {Two Approaches to Build {UOV} Variants with Shorter Private Key and
                  Faster Signature Generation},
  booktitle    = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38898-4\_4},
  doi          = {10.1007/978-3-319-38898-4\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/TanT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {A Novel Signature Generation Approach for Polymorphic Worms},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 15th International
                  Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015.
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9530},
  pages        = {369--382},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27137-8\_28},
  doi          = {10.1007/978-3-319-27137-8\_28},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/DavidN15,
  author       = {Omid E. David and
                  Nathan S. Netanyahu},
  title        = {DeepSign: Deep learning for automatic malware signature generation
                  and classification},
  booktitle    = {2015 International Joint Conference on Neural Networks, {IJCNN} 2015,
                  Killarney, Ireland, July 12-17, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IJCNN.2015.7280815},
  doi          = {10.1109/IJCNN.2015.7280815},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/DavidN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XuLMMBNA15,
  author       = {Qiang Xu and
                  Yong Liao and
                  Stanislav Miskovic and
                  Zhuoqing Morley Mao and
                  Mario Baldi and
                  Antonio Nucci and
                  Thomas Andrews},
  title        = {Automatic generation of mobile app signatures from traffic observations},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {1481--1489},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218526},
  doi          = {10.1109/INFOCOM.2015.7218526},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XuLMMBNA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WangH15,
  author       = {Jie Wang and
                  Xiaoxian He},
  editor       = {Moti Yung and
                  Jian{-}biao Zhang and
                  Zhen Yang},
  title        = {A Signature Generation Approach Based on Clustering for Polymorphic
                  Worm},
  booktitle    = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing,
                  China, December 7-8, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9565},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31550-8\_6},
  doi          = {10.1007/978-3-319-31550-8\_6},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/WangH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CashDK15,
  author       = {David Cash and
                  Rafael Dowsley and
                  Eike Kiltz},
  editor       = {Jonathan Katz},
  title        = {Digital Signatures from Strong {RSA} without Prime Generation},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {217--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_10},
  doi          = {10.1007/978-3-662-46447-2\_10},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CashDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/YangWZ14,
  author       = {Lili Yang and
                  Jie Wang and
                  Ping Zhong},
  editor       = {Xian{-}He Sun and
                  Wenyu Qu and
                  Ivan Stojmenovic and
                  Wanlei Zhou and
                  Zhiyang Li and
                  Hua Guo and
                  Geyong Min and
                  Tingting Yang and
                  Yulei Wu and
                  Lei (Chris) Liu},
  title        = {Combining Supervised and Unsupervised Learning for Automatic Attack
                  Signature Generation System},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 14th International
                  Conference, {ICA3PP} 2014, Dalian, China, August 24-27, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8630},
  pages        = {607--618},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11197-1\_47},
  doi          = {10.1007/978-3-319-11197-1\_47},
  timestamp    = {Fri, 22 Apr 2022 17:07:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/YangWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfhr/CabreraGMFG14,
  author       = {Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Marta Gomez{-}Barrero and
                  Aythami Morales and
                  Miguel Angel Ferrer{-}Ballester and
                  Javier Galbally},
  title        = {Generation of Enhanced Synthetic Off-Line Signatures Based on Real
                  On-Line Data},
  booktitle    = {14th International Conference on Frontiers in Handwriting Recognition,
                  {ICFHR} 2014, Crete, Greece, September 1-4, 2014},
  pages        = {482--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICFHR.2014.87},
  doi          = {10.1109/ICFHR.2014.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfhr/CabreraGMFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/AydinAB14,
  author       = {Abdulbaki Aydin and
                  Muath Alkhalaf and
                  Tevfik Bultan},
  title        = {Automated Test Generation from Vulnerability Signatures},
  booktitle    = {Seventh {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland,
                  Ohio, {USA}},
  pages        = {193--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICST.2014.32},
  doi          = {10.1109/ICST.2014.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/AydinAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/HobeikaPLTBA14,
  author       = {Christelle Hobeika and
                  Simon Pichette and
                  M. A. Leonard and
                  Claude Thibeault and
                  Jean{-}Fran{\c{c}}ois Boland and
                  Yves Audet},
  title        = {Multi-abstraction level signature generation and comparison based
                  on radiation single event upset},
  booktitle    = {2014 {IEEE} 20th International On-Line Testing Symposium, {IOLTS}
                  2014, Platja d'Aro, Girona, Spain, July 7-9, 2014},
  pages        = {212--215},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IOLTS.2014.6873700},
  doi          = {10.1109/IOLTS.2014.6873700},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/HobeikaPLTBA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snds/KaurS14,
  author       = {Ratinder Kaur and
                  Maninder Singh},
  editor       = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Sabu M. Thampi and
                  Ryan K. L. Ko and
                  Lei Shu},
  title        = {Automatic Evaluation and Signature Generation Technique for Thwarting
                  Zero-Day Attacks},
  booktitle    = {Recent Trends in Computer Networks and Distributed Systems Security
                  - Second International Conference, {SNDS} 2014, Trivandrum, India,
                  March 13-14, 2014, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {420},
  pages        = {298--309},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54525-2\_27},
  doi          = {10.1007/978-3-642-54525-2\_27},
  timestamp    = {Sat, 19 Oct 2019 19:58:53 +0200},
  biburl       = {https://dblp.org/rec/conf/snds/KaurS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/KaurS13,
  author       = {Sanmeet Kaur and
                  Maninder Singh},
  title        = {Automatic Attack Signature Generation Systems: {A} Review},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {11},
  number       = {6},
  pages        = {54--61},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2013.51},
  doi          = {10.1109/MSP.2013.51},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/KaurS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdc/Spencer13,
  author       = {Ross Spencer},
  title        = {Generation of a Skeleton Corpus of Digital Objects for the Validation
                  and Evaluation of Format Identification Tools and Signatures},
  journal      = {Int. J. Digit. Curation},
  volume       = {8},
  number       = {1},
  pages        = {120--130},
  year         = {2013},
  url          = {https://doi.org/10.2218/ijdc.v8i1.249},
  doi          = {10.2218/IJDC.V8I1.249},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdc/Spencer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/AltwaijryS13,
  author       = {Hesham Altwaijry and
                  Khalid Shahbar},
  title        = {{(WHASG)} Automatic {SNORT} Signatures Generation by using Honeypot},
  journal      = {J. Comput.},
  volume       = {8},
  number       = {12},
  pages        = {3280--3286},
  year         = {2013},
  url          = {http://www.jcomputers.us/index.php?m=content\&c=index\&a=show\&catid=113\&id=1510},
  doi          = {10.4304/JCP.8.12.3280-3286},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/AltwaijryS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/KimC13,
  author       = {Hwan{-}Hee Kim and
                  Mi{-}Jung Choi},
  title        = {Towards automatic signature generation for identification of HTTP-based
                  applications},
  booktitle    = {15th Asia-Pacific Network Operations and Management Symposium, {APNOMS}
                  2013, Hiroshima, Japan, September 25-27, 2013},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6665215/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apnoms/KimC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YasudaDTS13,
  author       = {Takanori Yasuda and
                  Jintai Ding and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {A variant of rainbow with shorter secret key and faster signature
                  generation},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484401},
  doi          = {10.1145/2484389.2484401},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YasudaDTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/Ferrer-BallesterCM13,
  author       = {Miguel Angel Ferrer{-}Ballester and
                  Mois{\'{e}}s D{\'{\i}}az Cabrera and
                  Aythami Morales},
  editor       = {Julian Fi{\'{e}}rrez and
                  Ajay Kumar and
                  Mayank Vatsa and
                  Raymond N. J. Veldhuis and
                  Javier Ortega{-}Garcia},
  title        = {Synthetic off-line signature image generation},
  booktitle    = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013,
                  Madrid, Spain},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICB.2013.6612969},
  doi          = {10.1109/ICB.2013.6612969},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/Ferrer-BallesterCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/KuzunoT13,
  author       = {Hiroki Kuzuno and
                  Satoshi Tonami},
  editor       = {Chee Yong Chan and
                  Jiaheng Lu and
                  Kjetil N{\o}rv{\aa}g and
                  Egemen Tanin},
  title        = {Signature generation for sensitive information leakage in android
                  applications},
  booktitle    = {Workshops Proceedings of the 29th {IEEE} International Conference
                  on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12,
                  2013},
  pages        = {112--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDEW.2013.6547438},
  doi          = {10.1109/ICDEW.2013.6547438},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/KuzunoT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciap/PirloIPOCGR13,
  author       = {Giuseppe Pirlo and
                  Donato Impedovo and
                  Rejean Plamondon and
                  Christian O'Reilly and
                  A. Cozzolongo and
                  R. Gravinese and
                  Andrea Rollo},
  editor       = {Alfredo Petrosino and
                  Lucia Maddalena and
                  Pietro Pala},
  title        = {Stability of Dynamic Signatures: From the Representation to the Generation
                  Domain},
  booktitle    = {New Trends in Image Analysis and Processing - {ICIAP} 2013 - {ICIAP}
                  2013 International Workshops, Naples, Italy, September 9-13, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8158},
  pages        = {122--130},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41190-8\_14},
  doi          = {10.1007/978-3-642-41190-8\_14},
  timestamp    = {Tue, 18 Jun 2019 15:49:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iciap/PirloIPOCGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13,
  author       = {Huabiao Lu and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {DiffSig: Resource Differentiation Based Malware Behavioral Concise
                  Signature Generation},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_28},
  doi          = {10.1007/978-3-642-36818-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/LuZWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RafiqueC13,
  author       = {M. Zubair Rafique and
                  Juan Caballero},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {{FIRMA:} Malware Clustering and Network Signature Generation with
                  Mixed Network Behaviors},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_8},
  doi          = {10.1007/978-3-642-41284-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RafiqueC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-4045,
  author       = {Hiroki Kuzuno and
                  Satoshi Tonami},
  title        = {Signature Generation for Sensitive Information Leakage in Android
                  Applications},
  journal      = {CoRR},
  volume       = {abs/1305.4045},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.4045},
  eprinttype    = {arXiv},
  eprint       = {1305.4045},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-4045.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/VenckauskasJMM12,
  author       = {Algimantas Venckauskas and
                  Nerijus Jusas and
                  Irena Mikuckiene and
                  Stasys Maciulevicius},
  title        = {Generation of the Secret Encryption Key Using the Signature of the
                  Embedded System},
  journal      = {Inf. Technol. Control.},
  volume       = {41},
  number       = {4},
  pages        = {368--375},
  year         = {2012},
  url          = {https://doi.org/10.5755/j01.itc.41.4.1162},
  doi          = {10.5755/J01.ITC.41.4.1162},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/VenckauskasJMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/VogelRS12,
  author       = {Michael Vogel and
                  Ren{\'{e}} Rietz and
                  Sebastian Schmerl},
  title        = {Automated Generation of Precise Signatures},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {35},
  number       = {1},
  pages        = {40--45},
  year         = {2012},
  url          = {https://doi.org/10.1515/pik-2012-0007},
  doi          = {10.1515/PIK-2012-0007},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/VogelRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/GalballyFOP12,
  author       = {Javier Galbally and
                  Julian Fi{\'{e}}rrez{-}Aguilar and
                  Javier Ortega{-}Garcia and
                  R{\'{e}}jean Plamondon},
  title        = {Synthetic on-line signature generation. Part {II:} Experimental validation},
  journal      = {Pattern Recognit.},
  volume       = {45},
  number       = {7},
  pages        = {2622--2632},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.patcog.2011.12.007},
  doi          = {10.1016/J.PATCOG.2011.12.007},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pr/GalballyFOP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/GalballyPFO12,
  author       = {Javier Galbally and
                  R{\'{e}}jean Plamondon and
                  Julian Fi{\'{e}}rrez{-}Aguilar and
                  Javier Ortega{-}Garcia},
  title        = {Synthetic on-line signature generation. Part {I:} Methodology and
                  algorithms},
  journal      = {Pattern Recognit.},
  volume       = {45},
  number       = {7},
  pages        = {2610--2621},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.patcog.2011.12.011},
  doi          = {10.1016/J.PATCOG.2011.12.011},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/GalballyPFO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccomm/SerbP12,
  author       = {Mihai Serb and
                  Victor Valeriu Patriciu},
  title        = {Using MTMs to secure electronic signatures generation},
  booktitle    = {9th International Conference on Communications, {COMM} 2012, Bucharest,
                  Romania, June 21-23, 2012},
  pages        = {315--318},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICComm.2012.6262538},
  doi          = {10.1109/ICCOMM.2012.6262538},
  timestamp    = {Thu, 07 Apr 2022 14:06:59 +0200},
  biburl       = {https://dblp.org/rec/conf/iccomm/SerbP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/visapp/DOrazioG12,
  author       = {Tiziana D'Orazio and
                  Cataldo Guaragnella},
  editor       = {Gabriela Csurka and
                  Jos{\'{e}} Braz},
  title        = {A Graph-based Signature Generation for People Re-identification in
                  a Multi-camera Surveillance System},
  booktitle    = {{VISAPP} 2012 - Proceedings of the International Conference on Computer
                  Vision Theory and Applications, Volume 1, Rome, Italy, 24-26 February,
                  2012},
  pages        = {414--417},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Fri, 25 May 2012 14:48:14 +0200},
  biburl       = {https://dblp.org/rec/conf/visapp/DOrazioG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Hu11,
  author       = {Xin Hu},
  title        = {Large Scale Malware Analysis, Detection and Signature Generation},
  school       = {University of Michigan, {USA}},
  year         = {2011},
  url          = {https://hdl.handle.net/2027.42/89760},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Hu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/LeeC11,
  author       = {Mn{-}Ta Lee and
                  Hsuan T. Chang},
  title        = {On the pinned field image binarization for signature generation in
                  image ownership verification method},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2011},
  pages        = {44},
  year         = {2011},
  url          = {https://doi.org/10.1186/1687-6180-2011-44},
  doi          = {10.1186/1687-6180-2011-44},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/LeeC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KongJGZLX11,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  title        = {{SAS:} semantics aware signature generation for polymorphic worm detection},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {5},
  pages        = {269--283},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0132-7},
  doi          = {10.1007/S10207-011-0132-7},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TangXL11,
  author       = {Yong Tang and
                  Bin Xiao and
                  Xicheng Lu},
  title        = {Signature Tree Generation for Polymorphic Worms},
  journal      = {{IEEE} Trans. Computers},
  volume       = {60},
  number       = {4},
  pages        = {565--579},
  year         = {2011},
  url          = {https://doi.org/10.1109/TC.2010.130},
  doi          = {10.1109/TC.2010.130},
  timestamp    = {Sun, 23 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/TangXL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/ShabtaiME11,
  author       = {Asaf Shabtai and
                  Eitan Menahem and
                  Yuval Elovici},
  title        = {F-Sign: Automatic, Function-Based Signature Generation for Malware},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {41},
  number       = {4},
  pages        = {494--508},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSMCC.2010.2068544},
  doi          = {10.1109/TSMCC.2010.2068544},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/ShabtaiME11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/ScheuermannBH11,
  author       = {Dirk Scheuermann and
                  Bastian Wolfgruber and
                  Olaf Henniger},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch},
  title        = {On biometric key generation from handwritten signatures},
  booktitle    = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-191}},
  pages        = {103--114},
  publisher    = {{GI}},
  year         = {2011},
  url          = {https://dl.gi.de/handle/20.500.12116/18532},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/ScheuermannBH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/valuetools/SzaboTTMS11,
  author       = {G{\'{e}}za Szab{\'{o}} and
                  Zolt{\'{a}}n Richard Tur{\'{a}}nyi and
                  L{\'{a}}szl{\'{o}} Toka and
                  S{\'{a}}ndor Moln{\'{a}}r and
                  Alysson Santos},
  editor       = {Samson Lasaulce and
                  Dieter Fiems and
                  Peter G. Harrison and
                  Luc Vandendorpe},
  title        = {Automatic protocol signature generation framework for deep packet
                  inspection},
  booktitle    = {5th International {ICST} Conference on Performance Evaluation Methodologies
                  and Tools Communications, {VALUETOOLS} '11, Paris, France, May 16-20,
                  2011},
  pages        = {291--299},
  publisher    = {{ICST/ACM}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.valuetools.2011.245606},
  doi          = {10.4108/ICST.VALUETOOLS.2011.245606},
  timestamp    = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/valuetools/SzaboTTMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vts/BanerjeeSDC11,
  author       = {Aritra Banerjee and
                  Shreyas Sen and
                  Shyam Kumar Devarakond and
                  Abhijit Chatterjee},
  title        = {Automatic test stimulus generation for accurate diagnosis of {RF}
                  systems using transient response signatures},
  booktitle    = {29th {IEEE} {VLSI} Test Symposium, {VTS} 2011, May 1-5, 2011, Dana
                  Point, California, {USA}},
  pages        = {58--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/VTS.2011.5783755},
  doi          = {10.1109/VTS.2011.5783755},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/vts/BanerjeeSDC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KattiK10,
  author       = {Rajendra S. Katti and
                  Rajesh G. Kavasseri},
  title        = {Nonce Generation For The Digital Signature Standard},
  journal      = {Int. J. Netw. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {23--32},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v11-n1/ijns-2010-v11-n1-p23-32.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KattiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangLCFL10,
  author       = {Lanjia Wang and
                  Zhichun Li and
                  Yan Chen and
                  Zhi Fu and
                  Xing Li},
  title        = {Thwarting zero-day polymorphic worms with network-level length-based
                  signature generation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {1},
  pages        = {53--66},
  year         = {2010},
  url          = {http://doi.acm.org/10.1145/1816288.1816293},
  doi          = {10.1145/1816288.1816293},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/WangLCFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/DurmeL10,
  author       = {Benjamin Van Durme and
                  Ashwin Lall},
  title        = {Online Generation of Locality Sensitive Hash Signatures},
  booktitle    = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association
                  for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden,
                  Short Papers},
  pages        = {231--235},
  publisher    = {The Association for Computer Linguistics},
  year         = {2010},
  url          = {https://aclanthology.org/P10-2043/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/DurmeL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/ShezafR10,
  author       = {Daphna Shezaf and
                  Ari Rappoport},
  editor       = {Jan Hajic and
                  Sandra Carberry and
                  Stephen Clark},
  title        = {Bilingual Lexicon Generation Using Non-Aligned Signatures},
  booktitle    = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association
                  for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden},
  pages        = {98--107},
  publisher    = {The Association for Computer Linguistics},
  year         = {2010},
  url          = {https://aclanthology.org/P10-1011/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/ShezafR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aict/Garcia-TeodoroMR10,
  author       = {Pedro Garcia{-}Teodoro and
                  Pablo Mu{\~{n}}oz{-}Feldstedt and
                  David Ruete{-}Z{\'{u}}{\~{n}}iga},
  editor       = {T{\"{u}}lin Atmaca and
                  Jacques Palicot and
                  Amor Nafkha and
                  Thrasyvoulos Tsiatsos and
                  Michel Marot and
                  Oana Dini},
  title        = {Automatic Signature Generation for Network Services through Selective
                  Extraction of Anomalous Contents},
  booktitle    = {Sixth Advanced International Conference on Telecommunications, {AICT}
                  2010, 9-15 May 2010, Barcelona, Spain},
  pages        = {370--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/AICT.2010.22},
  doi          = {10.1109/AICT.2010.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aict/Garcia-TeodoroMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/Shoufan10,
  author       = {Abdulhadi Shoufan},
  editor       = {Phaophak Sirisuk and
                  Fearghal Morgan and
                  Tarek A. El{-}Ghazawi and
                  Hideharu Amano},
  title        = {An {FPGA} Accelerator for Hash Tree Generation in the Merkle Signature
                  Scheme},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications, 6th
                  International Symposium, {ARC} 2010, Bangkok, Thailand, March 17-19,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5992},
  pages        = {145--156},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12133-3\_15},
  doi          = {10.1007/978-3-642-12133-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/Shoufan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arcs/Fechner10,
  author       = {Bernhard Fechner},
  editor       = {Michael Beigl and
                  Francisco Javier Cazorla{-}Almeida},
  title        = {GPU-Based Parallel Signature Scanning and Hash Generation},
  booktitle    = {{ARCS} '10 - 23th International Conference on Architecture of Computing
                  Systens 2010, Workshop Proceedings, February 22-23, 2010, Hannover,
                  Germany},
  pages        = {133--138},
  publisher    = {{VDE} Verlag},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5758996/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arcs/Fechner10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/ChaisornSM10,
  author       = {Lekha Chaisorn and
                  Janya Sainui and
                  Corey Manders},
  title        = {Fast and efficient video signature generation and matching for online
                  video sharing},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2010, September 26-29, Hong Kong, China},
  pages        = {2129--2132},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICIP.2010.5652053},
  doi          = {10.1109/ICIP.2010.5652053},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/ChaisornSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangKP10,
  author       = {Junxing Zhang and
                  Sneha Kumar Kasera and
                  Neal Patwari},
  title        = {Mobility Assisted Secret Key Generation Using Wireless Link Signatures},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {261--265},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462231},
  doi          = {10.1109/INFCOM.2010.5462231},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/PerdisciLF10,
  author       = {Roberto Perdisci and
                  Wenke Lee and
                  Nick Feamster},
  title        = {Behavioral Clustering of HTTP-Based Malware and Signature Generation
                  Using Malicious Network Traces},
  booktitle    = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design
                  and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA,
                  {USA}},
  pages        = {391--404},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/nsdi10/tech/full\_papers/perdisci.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/PerdisciLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/Tang10,
  author       = {Xinyu Tang},
  title        = {The Generation of Attack Signatures Based on Virtual Honeypots},
  booktitle    = {2010 International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2010, Wuhan, China, 8-11 December,
                  2010},
  pages        = {435--439},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PDCAT.2010.54},
  doi          = {10.1109/PDCAT.2010.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/Tang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KongJGZLX10,
  author       = {Deguang Kong and
                  Yoon{-}chan Jhi and
                  Tao Gong and
                  Sencun Zhu and
                  Peng Liu and
                  Hongsheng Xi},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_1},
  doi          = {10.1007/978-3-642-16161-2\_1},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LuminiN09,
  author       = {Alessandra Lumini and
                  Loris Nanni},
  title        = {Ensemble of on-line signature matchers based on OverComplete feature
                  generation},
  journal      = {Expert Syst. Appl.},
  volume       = {36},
  number       = {3},
  pages        = {5291--5296},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.eswa.2008.06.069},
  doi          = {10.1016/J.ESWA.2008.06.069},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/LuminiN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiJS09,
  author       = {Lixin Li and
                  James E. Just and
                  R. Sekar},
  title        = {Online Signature Generation for Windows Systems},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {289--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.34},
  doi          = {10.1109/ACSAC.2009.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadcom/MohammedCVHA09,
  author       = {Mohssen Mohammed Zian Elaabdeen Mohammed and
                  H. Anthony Chan and
                  Neco Ventura and
                  Mohsin Hashim and
                  Ezzeldien Amin},
  editor       = {Tomasz Janiczek and
                  Ryszard Klempous and
                  Jan Nikodem and
                  Ryszard J. Zielinski and
                  Johnson I. Agbinya and
                  Robin Braun and
                  Zenon Chaczko},
  title        = {Signature Generation for Zero-day Polymorphic Works},
  booktitle    = {Selected Papers on Broadband Communication, Information Technology
                  {\&} Biomedical Applications, BroadBandCom 2009, Proceedings,
                  Wroc{\l}aw, Poland, July 15-18, 2009},
  pages        = {295--300},
  publisher    = {Wroc{\l}aw University of Technology},
  year         = {2009},
  timestamp    = {Tue, 18 Apr 2023 16:23:03 +0200},
  biburl       = {https://dblp.org/rec/conf/broadcom/MohammedCVHA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YaoLZ09,
  author       = {Li Yao and
                  Yu Liu and
                  Yuqing Zhang},
  title        = {An Integrated Approach to Worm Detection and Automatic Signature Generation},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop
                  Papers},
  pages        = {371--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.274},
  doi          = {10.1109/CIS.2009.274},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YaoLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WyschogrodD09,
  author       = {Daniel Wyschogrod and
                  Jeffrey Dezso},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Using automatic signature generation as a sensor backend},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {29},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558640},
  doi          = {10.1145/1558607.1558640},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WyschogrodD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/depcos/Tylman09,
  author       = {Wojciech Tylman},
  title        = {Data Mining Techniques for Semi-automatic Signature Generation},
  booktitle    = {Fourth International Conference on Dependability of Computer Systems,
                  DepCos-RELCOMEX '09, Brunow, Poland, June 30 - July 2, 2009},
  pages        = {210--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DepCoS-RELCOMEX.2009.24},
  doi          = {10.1109/DEPCOS-RELCOMEX.2009.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/depcos/Tylman09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangWCZ09,
  author       = {Jie Wang and
                  Jianxin Wang and
                  Jianer Chen and
                  Xi Zhang},
  title        = {An Automated Signature Generation Approach for Polymorphic Worm Based
                  on Color Coding},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198721},
  doi          = {10.1109/ICC.2009.5198721},
  timestamp    = {Tue, 12 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangWCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GriffinSHC09,
  author       = {Kent Griffin and
                  Scott Schneider and
                  Xin Hu and
                  Tzi{-}cker Chiueh},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Automatic Generation of String Signatures for Malware Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_6},
  doi          = {10.1007/978-3-642-04342-0\_6},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GriffinSHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsea/LiXYW08,
  author       = {Nan Li and
                  Chunhe Xia and
                  Yi Yang and
                  Haiquan Wang},
  title        = {An Algorithm for Generation of Attack Signatures Based on Sequences
                  Alignment},
  journal      = {J. Softw. Eng. Appl.},
  volume       = {1},
  number       = {1},
  pages        = {76--82},
  year         = {2008},
  url          = {https://doi.org/10.4236/jsea.2008.11011},
  doi          = {10.4236/JSEA.2008.11011},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsea/LiXYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrumleyNSWJ08,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Theory and Techniques for Automatic Generation of Vulnerability-Based
                  Signatures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1109/TDSC.2008.55},
  doi          = {10.1109/TDSC.2008.55},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WangLCXRK08,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jong Youl Choi and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil},
  title        = {Fast and Black-box Exploit Detection and Signature Generation for
                  Commodity Software},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {11:1--11:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455523},
  doi          = {10.1145/1455518.1455523},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08,
  author       = {V. Sai Sathyanarayan and
                  Pankaj Kohli and
                  Bezawada Bruhadeshwar},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Signature Generation and Detection of Malware Families},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {336--349},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_25},
  doi          = {10.1007/978-3-540-70500-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SathyanarayanKB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NandaC08,
  author       = {Susanta Nanda and
                  Tzi{-}cker Chiueh},
  title        = {Execution Trace-Driven Automated Attack Signature Generation},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {195--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.58},
  doi          = {10.1109/ACSAC.2008.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NandaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/BalasubramanianCBRD08,
  author       = {Sundar Balasubramanian and
                  Harold W. Carter and
                  Andrey Bogdanov and
                  Andy Rupp and
                  Jintai Ding},
  title        = {Fast multivariate signature generation in hardware: The case of rainbow},
  booktitle    = {19th {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven,
                  Belgium},
  pages        = {25--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ASAP.2008.4580149},
  doi          = {10.1109/ASAP.2008.4580149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/BalasubramanianCBRD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bliss/HoqueFH08,
  author       = {Sanaul Hoque and
                  Michael C. Fairhurst and
                  W. Gareth J. Howells},
  editor       = {Adrian Stoica and
                  Tughrul Arslan and
                  Daniel Howard and
                  Tetsuya Higuchi and
                  Ahmed O. El{-}Rayis},
  title        = {Evaluating Biometric Encryption Key Generation Using Handwritten Signatures},
  booktitle    = {2008 {ECSIS} Symposium on Bio-inspired, Learning, and Intelligent
                  Systems for Security, {BLISS} 2008, Edinburgh, UK, 4-6 August 2008},
  pages        = {17--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/BLISS.2008.8},
  doi          = {10.1109/BLISS.2008.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bliss/HoqueFH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadcom/MohammedC08,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan},
  editor       = {Johnson I. Agbinya and
                  Elmarie Biermann and
                  Yskandar Hamam and
                  Ntsibane Ntlatlapa and
                  Keith Ferguson},
  title        = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet},
  booktitle    = {2008 Third International Conference on Broadband Communications, Information
                  Technology {\&} Biomedical Applications, BroadCom 2008, 23-26
                  November 2008, Pretoria, Gauteng, South Africa},
  pages        = {142--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/BROADCOM.2008.21},
  doi          = {10.1109/BROADCOM.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/broadcom/MohammedC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08,
  author       = {Urko Zurutuza and
                  Roberto Uribeetxeberria and
                  Diego Zamboni},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {A data mining approach for analysis of worm activity through automatic
                  signature generation},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456394},
  doi          = {10.1145/1456377.1456394},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZurutuzaUZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/LiXYW08,
  author       = {Nan Li and
                  Chunhe Xia and
                  Yi Yang and
                  Haiquan Wang},
  title        = {An Algorithm for Generation of Attack Signatures Based on Sequences
                  Alignment},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {964--969},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.555},
  doi          = {10.1109/CSSE.2008.555},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/LiXYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/delta/DoulcierFR08,
  author       = {M. Doulcier and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre},
  title        = {AES-Based {BIST:} Self-Test, Test Pattern Generation and Signature
                  Analysis},
  booktitle    = {4th {IEEE} International Symposium on Electronic Design, Test and
                  Applications, {DELTA} 2008, Hong Kong, January 23-25, 2008},
  pages        = {314--321},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/DELTA.2008.86},
  doi          = {10.1109/DELTA.2008.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/delta/DoulcierFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiWLR08,
  author       = {Zhuowei Li and
                  XiaoFeng Wang and
                  Zhenkai Liang and
                  Michael K. Reiter},
  title        = {{AGIS:} Towards automatic generation of infection signatures},
  booktitle    = {The 38th Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska,
                  USA, Proceedings},
  pages        = {237--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/DSN.2008.4630092},
  doi          = {10.1109/DSN.2008.4630092},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiWLR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fccm/BalasubramanianBRDC08,
  author       = {Sundar Balasubramanian and
                  Andrey Bogdanov and
                  Andy Rupp and
                  Jintai Ding and
                  Harold W. Carter},
  editor       = {Kenneth L. Pocek and
                  Duncan A. Buell},
  title        = {Fast Multivariate Signature Generation in Hardware: The Case of Rainbow},
  booktitle    = {16th {IEEE} International Symposium on Field-Programmable Custom Computing
                  Machines, {FCCM} 2008, 14-15 April 2008, Stanford, Palo Alto, California,
                  {USA}},
  pages        = {281--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FCCM.2008.52},
  doi          = {10.1109/FCCM.2008.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fccm/BalasubramanianBRDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/YaoLGZY08,
  author       = {Yu Yao and
                  Junwei Lv and
                  Fuxiang Gao and
                  Yanfang Zhang and
                  Ge Yu},
  title        = {Behavior-Based Worm Detection and Signature Generation},
  booktitle    = {International Multisymposiums on Computer and Computational Sciences,
                  {IMSCCS} 2008, Shanghai, China, October 18-20, 2008},
  pages        = {124--131},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IMSCCS.2008.29},
  doi          = {10.1109/IMSCCS.2008.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/YaoLGZY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/VenkataramanBS08,
  author       = {Shobha Venkataraman and
                  Avrim Blum and
                  Dawn Song},
  title        = {Limits of Learning-based Signature Generation with Adversaries},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/limits-of-learning-based-signature-generation-with-adversaries/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/VenkataramanBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/ParkWKH08,
  author       = {Byung{-}Chul Park and
                  Young J. Won and
                  Myung{-}Sup Kim and
                  James W. Hong},
  editor       = {Marcus Brunner and
                  Carlos Becker Westphall and
                  Lisandro Zambenedetti Granville},
  title        = {Towards automated application signature generation for traffic identification},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive
                  Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11
                  April 2008, Salvador, Bahia, Brazil},
  pages        = {160--167},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NOMS.2008.4575130},
  doi          = {10.1109/NOMS.2008.4575130},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/ParkWKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/XiaoHCL08,
  author       = {Fengtao Xiao and
                  Huaping Hu and
                  Xin Chen and
                  Bo Liu},
  title        = {{ASG} Automated Signature Generation for Worm-Like {P2P} Traffic Patterns},
  booktitle    = {The Ninth International Conference on Web-Age Information Management,
                  {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China},
  pages        = {654--660},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAIM.2008.95},
  doi          = {10.1109/WAIM.2008.95},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/XiaoHCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiHPP07,
  author       = {Min Cai and
                  Kai Hwang and
                  Jianping Pan and
                  Christos Papadopoulos},
  title        = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint
                  Aggregation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {88--104},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.1000},
  doi          = {10.1109/TDSC.2007.1000},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaiHPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HwangCCQ07,
  author       = {Kai Hwang and
                  Min Cai and
                  Ying Chen and
                  Min Qin},
  title        = {Hybrid Intrusion Detection with Weighted Signature Generation over
                  Anomalous Internet Episodes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {1},
  pages        = {41--55},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.9},
  doi          = {10.1109/TDSC.2007.9},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HwangCCQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GundyCSV07,
  author       = {Matthew Van Gundy and
                  Hao Chen and
                  Zhendong Su and
                  Giovanni Vigna},
  title        = {Feature Omission Vulnerabilities: Thwarting Signature Generation for
                  Polymorphic Worms},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {74--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.42},
  doi          = {10.1109/ACSAC.2007.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/faw/JoSL07,
  author       = {Je{-}Gyeong Jo and
                  Jong{-}Won Seo and
                  Hyung{-}Woo Lee},
  editor       = {Franco P. Preparata and
                  Qizhi Fang},
  title        = {Biometric Digital Signature Key Generation and Cryptography Communication
                  Based on Fingerprint},
  booktitle    = {Frontiers in Algorithmics, First Annual International Workshop, {FAW}
                  2007, Lanzhou, China, August 1-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4613},
  pages        = {38--49},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73814-5\_4},
  doi          = {10.1007/978-3-540-73814-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/faw/JoSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/LiWCF07,
  author       = {Zhichun Li and
                  Lanjia Wang and
                  Yan Chen and
                  Zhi Fu},
  title        = {Network-based and Attack-resilient Length Signature Generation for
                  Zero-day Polymorphic Worms},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {164--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375847},
  doi          = {10.1109/ICNP.2007.4375847},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/LiWCF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/TanakaSEY07,
  author       = {Hideaki Tanaka and
                  Shoichi Sasaki and
                  Isao Echizen and
                  Hiroshi Yoshiura},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {Secure Generation of Digital Signature on Compromised Computer},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {12--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIH-MSP.2007.276},
  doi          = {10.1109/IIH-MSP.2007.276},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/TanakaSEY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kesamsta/KimLK07a,
  author       = {Sijung Kim and
                  Geuk Lee and
                  Bonghan Kim},
  editor       = {Ngoc Thanh Nguyen and
                  Adam Grzech and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {The Design and Testing of Automated Signature Generation Engine for
                  Worms Detection},
  booktitle    = {Agent and Multi-Agent Systems: Technologies and Applications, First
                  {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland,
                  May 31- June 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4496},
  pages        = {956--963},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72830-6\_101},
  doi          = {10.1007/978-3-540-72830-6\_101},
  timestamp    = {Thu, 16 Mar 2023 20:00:31 +0100},
  biburl       = {https://dblp.org/rec/conf/kesamsta/KimLK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/Nait-Sidi-MohWRG07,
  author       = {Ahmed Nait{-}Sidi{-}Moh and
                  Maxime Wack and
                  Damien Rieupet and
                  Jaafar Gaber},
  editor       = {Colette Rolland and
                  Oscar Pastor and
                  Jean{-}Louis Cavarero},
  title        = {On an innovative generation method of electronic signatures: comparative
                  study with traditional hash functions simulation},
  booktitle    = {Proceedings of the First International Conference on Research Challenges
                  in Information Science, {RCIS} 2007, Ouarzazate, Morocco, April 23-26,
                  2007},
  pages        = {357--360},
  year         = {2007},
  timestamp    = {Mon, 18 Jan 2021 08:56:35 +0100},
  biburl       = {https://dblp.org/rec/conf/rcis/Nait-Sidi-MohWRG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJG06,
  author       = {Hao Wang and
                  Somesh Jha and
                  Vinod Ganapathy},
  title        = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {99--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.34},
  doi          = {10.1109/ACSAC.2006.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangLXRKC06,
  author       = {XiaoFeng Wang and
                  Zhuowei Li and
                  Jun Xu and
                  Michael K. Reiter and
                  Chongkyung Kil and
                  Jong Youl Choi},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Packet vaccine: black-box exploit detection and signature generation},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180412},
  doi          = {10.1145/1180405.1180412},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangLXRKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/PortokalidisSB06,
  author       = {Georgios Portokalidis and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Yolande Berbers and
                  Willy Zwaenepoel},
  title        = {Argos: an emulator for fingerprinting zero-day attacks for advertised
                  honeypots with automatic signature generation},
  booktitle    = {Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April
                  18-21, 2006},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1217935.1217938},
  doi          = {10.1145/1217935.1217938},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/PortokalidisSB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/YipGNT06,
  author       = {Wai Kuan Yip and
                  Alwyn Goh and
                  David Ngo Chek Ling and
                  Andrew Teoh Beng Jin},
  editor       = {David Zhang and
                  Anil K. Jain},
  title        = {Generation of Replaceable Cryptographic Keys from Dynamic Handwritten
                  Signatures},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2006, Hong
                  Kong, China, January 5-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3832},
  pages        = {509--515},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11608288\_68},
  doi          = {10.1007/11608288\_68},
  timestamp    = {Thu, 17 Oct 2019 12:39:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/YipGNT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mrcs/WahlHHI06,
  author       = {Alain Wahl and
                  Jean Hennebert and
                  Andreas Humm and
                  Rolf Ingold},
  editor       = {Bilge G{\"{u}}nsel and
                  Anil K. Jain and
                  A. Murat Tekalp and
                  B{\"{u}}lent Sankur},
  title        = {Generation and Evaluation of Brute-Force Signature Forgeries},
  booktitle    = {Multimedia Content Representation, Classification and Security, International
                  Workshop, {MRCS} 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4105},
  pages        = {2--9},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11848035\_2},
  doi          = {10.1007/11848035\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mrcs/WahlHHI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChungM06,
  author       = {Simon P. Chung and
                  Aloysius K. Mok},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Allergy Attack Against Automatic Signature Generation},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_4},
  doi          = {10.1007/11856214\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChungM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Towards Automatic Generation of Vulnerability-Based Signatures},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {2--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.41},
  doi          = {10.1109/SP.2006.41},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiSCKC06,
  author       = {Zhichun Li and
                  Manan Sanghi and
                  Yan Chen and
                  Ming{-}Yang Kao and
                  Brian Chavez},
  title        = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with
                  Provable Attack Resilience},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {32--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.18},
  doi          = {10.1109/SP.2006.18},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiSCKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiangS05,
  author       = {Zhenkai Liang and
                  R. Sekar},
  title        = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach
                  Based on Program Behavior Models},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.12},
  doi          = {10.1109/CSAC.2005.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiangS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiangS05,
  author       = {Zhenkai Liang and
                  R. Sekar},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Fast and automated generation of attack signatures: a basis for building
                  self-protecting servers},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {213--222},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102150},
  doi          = {10.1145/1102120.1102150},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiangS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/DyerN05,
  author       = {Justin S. Dyer and
                  Balasubramaniam Natarajan},
  title        = {A new deterministic algorithm for {DS-CDMA} signature sequence generation},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2005, Seoul, Korea, 16-20 May 2005},
  pages        = {2348--2351},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICC.2005.1494755},
  doi          = {10.1109/ICC.2005.1494755},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/DyerN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism/SimkhadaTWN05,
  author       = {Kumar Simkhada and
                  Hiroshi Tsunoda and
                  Yuji Waizumi and
                  Yoshiaki Nemoto},
  title        = {Differencing Worm Flows and Normal Flows for Automatic Generation
                  of Worm Signatures},
  booktitle    = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005),
                  12-14 December 2005, Irvine, CA, {USA}},
  pages        = {680--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISM.2005.49},
  doi          = {10.1109/ISM.2005.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ism/SimkhadaTWN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangCS05,
  author       = {Ke Wang and
                  Gabriela F. Cretu and
                  Salvatore J. Stolfo},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Anomalous Payload-Based Worm Detection and Signature Generation},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {227--246},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_12},
  doi          = {10.1007/11663812\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TangCR05,
  author       = {Caimu Tang and
                  Anthony T. Chronopoulos and
                  Cauligi S. Raghavendra},
  title        = {Soft-Timeout Distributed Key Generation for Digital Signature based
                  on Elliptic Curve D-log for Low-Power Devices},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {353--364},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.52},
  doi          = {10.1109/SECURECOMM.2005.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/TangCR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RubinJM05,
  author       = {Shai Rubin and
                  Somesh Jha and
                  Barton P. Miller},
  title        = {Language-Based Generation and Evaluation of {NIDS} Signatures},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.10},
  doi          = {10.1109/SP.2005.10},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RubinJM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/GuptaTM04,
  author       = {Alok Gupta and
                  Y. Alex Tung and
                  James R. Marsden},
  title        = {Digital signature: use and modification to achieve success in next
                  generational e-business processes},
  journal      = {Inf. Manag.},
  volume       = {41},
  number       = {5},
  pages        = {561--575},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0378-7206(03)00090-9},
  doi          = {10.1016/S0378-7206(03)00090-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/GuptaTM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SameshimaSOM04,
  author       = {Yoshiki Sameshima and
                  Hideaki Saisho and
                  Kazuko Oyanagi and
                  Tsutomu Matsumoto},
  title        = {Multiparty {DSA} Signature Generation without Simultaneous User Operations},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {87-D},
  number       = {8},
  pages        = {2095--2105},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-d\_8\_2095},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SameshimaSOM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MacKenzieR04,
  author       = {Philip D. MacKenzie and
                  Michael K. Reiter},
  title        = {Two-party generation of {DSA} signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {2},
  number       = {3-4},
  pages        = {218--239},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0041-0},
  doi          = {10.1007/S10207-004-0041-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MacKenzieR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KwonL04,
  author       = {Taekyoung Kwon and
                  Jaeil Lee},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {Practical Digital Signature Generation Using Biometrics},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3043},
  pages        = {728--737},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24707-4\_85},
  doi          = {10.1007/978-3-540-24707-4\_85},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KwonL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0409014,
  author       = {Manoj Kumar},
  title        = {A Digital Signature with Threshold Generation and Verification},
  journal      = {CoRR},
  volume       = {cs.CR/0409014},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs.CR/0409014},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0409014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/SadowskiP03,
  author       = {Michael I. Sadowski and
                  John Howard Parish},
  title        = {Automated generation and refinement of protein signatures: case study
                  with G-protein coupled receptors},
  journal      = {Bioinform.},
  volume       = {19},
  number       = {6},
  pages        = {727--734},
  year         = {2003},
  url          = {https://doi.org/10.1093/bioinformatics/btg075},
  doi          = {10.1093/BIOINFORMATICS/BTG075},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/SadowskiP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/YoussefA03,
  author       = {Bilal Youssef and
                  Mazen Alamir},
  title        = {Generic signature generation tool for diagnosis and parametric estimation
                  of multi-variable dynamical nonlinear systems},
  booktitle    = {42nd {IEEE} Conference on Decision and Control, {CDC} 2003, Maui,
                  Hawaii, USA, December 9-12, 2003},
  pages        = {966--971},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CDC.2003.1272692},
  doi          = {10.1109/CDC.2003.1272692},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/YoussefA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/FengW02,
  author       = {Feng Hao and
                  Chan Choong Wah},
  title        = {Private key generation from on-line handwritten signatures},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {159--164},
  year         = {2002},
  url          = {https://doi.org/10.1108/09685220210436949},
  doi          = {10.1108/09685220210436949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/FengW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MacKenzieR01,
  author       = {Philip D. MacKenzie and
                  Michael K. Reiter},
  editor       = {Joe Kilian},
  title        = {Two-Party Generation of {DSA} Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_8},
  doi          = {10.1007/3-540-44647-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MacKenzieR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Huhnlein01,
  author       = {Detlef H{\"{u}}hnlein},
  editor       = {David Naccache},
  title        = {Faster Generation of NICE-Schnorr-Type Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_1},
  doi          = {10.1007/3-540-45353-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Huhnlein01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Ramesh01,
  author       = {D. Ramesh},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {A Twin Algorithm for Efficient Generation of Digital Signatures},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {267--274},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_25},
  doi          = {10.1007/3-540-45311-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Ramesh01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwvf/Nishida01,
  author       = {Hirobumi Nishida},
  editor       = {Carlo Arcelli and
                  Luigi P. Cordella and
                  Gabriella Sanniti di Baja},
  title        = {Robust Structural Indexing through Quasi-Invariant Shape Signatures
                  and Feature Generation},
  booktitle    = {Visual Form 2001, 4th International Workshop on Visual Form, IWVF-4,
                  Capri, Italy, May 28-30, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2059},
  pages        = {696--705},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45129-3\_64},
  doi          = {10.1007/3-540-45129-3\_64},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iwvf/Nishida01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JakobssonW01,
  author       = {Markus Jakobsson and
                  Susanne Wetzel},
  editor       = {Kwangjo Kim},
  title        = {Secure Server-Aided Signature Generation},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {383--401},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_28},
  doi          = {10.1007/3-540-44586-2\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JakobssonW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ats/ShiehLS00,
  author       = {Ming{-}Der Shieh and
                  Hsin{-}Fu Lo and
                  Ming{-}Hwa Sheu},
  title        = {High-speed generation of {LFSR} signatures},
  booktitle    = {9th Asian Test Symposium {(ATS} 2000), 4-6 December 2000, Taipei,
                  Taiwan},
  pages        = {222},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ATS.2000.893629},
  doi          = {10.1109/ATS.2000.893629},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ats/ShiehLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/YarmanA00,
  author       = {B. Siddik Yarman and
                  Rafet Akdeniz},
  title        = {Generation of optimum signature base sequences for speech signals},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing.
                  {ICASSP} 2000, 5-9 June, 2000, Hilton Hotel and Convention Center,
                  Istanbul, Turkey},
  pages        = {1077--1080},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICASSP.2000.859150},
  doi          = {10.1109/ICASSP.2000.859150},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/YarmanA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edcc/Echtle99,
  author       = {Klaus Echtle},
  editor       = {Jan Hlavicka and
                  Erik Maehle and
                  Andr{\'{a}}s Pataricza},
  title        = {Avoiding Malicious Byzantine Faults by a New Signature Generation
                  Technique},
  booktitle    = {Dependable Computing - EDCC-3, Third European Dependable Computing
                  Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1667},
  pages        = {106--123},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48254-7\_9},
  doi          = {10.1007/3-540-48254-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/edcc/Echtle99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/ChakrabartiDAR98,
  author       = {Soumen Chakrabarti and
                  Byron Dom and
                  Rakesh Agrawal and
                  Prabhakar Raghavan},
  title        = {Scalable Feature Selection, Classification and Signature Generation
                  for Organizing Large Text Databases into Hierarchical Topic Taxonomies},
  journal      = {{VLDB} J.},
  volume       = {7},
  number       = {3},
  pages        = {163--178},
  year         = {1998},
  url          = {https://doi.org/10.1007/s007780050061},
  doi          = {10.1007/S007780050061},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vldb/ChakrabartiDAR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PoupardS98,
  author       = {Guillaume Poupard and
                  Jacques Stern},
  editor       = {Kaisa Nyberg},
  title        = {Security Analysis of a Practical "on the fly" Authentication and Signature
                  Generation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {422--436},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054143},
  doi          = {10.1007/BFB0054143},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PoupardS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/KinoshitaS98,
  author       = {Hirotsugu Kinoshita and
                  Masafumi Satoh},
  title        = {Generation of the signature with the structured information of the
                  image},
  booktitle    = {9th European Signal Processing Conference, {EUSIPCO} 1998, Island
                  of Rhodes, Greece, 8-11 September, 1998},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {1998},
  url          = {https://ieeexplore.ieee.org/document/7089552/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/KinoshitaS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bsdia/OliveiraKBS97,
  author       = {Claudio de Oliveira and
                  Celso A. A. Kaestner and
                  Fl{\'{a}}vio Bortolozzi and
                  Robert Sabourin},
  editor       = {Nabeel A. Murshed and
                  Fl{\'{a}}vio Bortolozzi},
  title        = {Generation of Signatures by Deformations},
  booktitle    = {Advances in Document Image Analysis, First Brazilian Symposium, BSDIA'97,
                  Curitiba, Brazil, November 2-5, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1339},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63791-5\_22},
  doi          = {10.1007/3-540-63791-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/bsdia/OliveiraKBS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spieSR/CelentanoL97,
  author       = {Augusto Celentano and
                  Vincenzo Di Lecce},
  editor       = {Ishwar K. Sethi and
                  Ramesh C. Jain},
  title        = {FFT-Based Technique for Image-Signature Generation},
  booktitle    = {Storage and Retrieval for Image and Video Databases V, San Jose, CA,
                  USA, February 8-14, 1997},
  series       = {{SPIE} Proceedings},
  volume       = {3022},
  pages        = {457--466},
  publisher    = {{SPIE}},
  year         = {1997},
  url          = {https://doi.org/10.1117/12.263435},
  doi          = {10.1117/12.263435},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spieSR/CelentanoL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MRaihiN96,
  author       = {David M'Ra{\"{\i}}hi and
                  David Naccache},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {58--61},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238187},
  doi          = {10.1145/238168.238187},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MRaihiN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramesD96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Neal Koblitz},
  title        = {New Generation of Secure and Practical RSA-Based Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {173--185},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_14},
  doi          = {10.1007/3-540-68697-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramesD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acm/YoungL94,
  author       = {Hwan{-}Seung Yong and
                  Sukho Lee},
  editor       = {John Werth and
                  Laurie Honour Werth},
  title        = {Signature File Generation Techniques for Query Processing in Object-Oriented
                  Databases},
  booktitle    = {Proceedings of the {ACM} 22rd Annual Computer Science Conference on
                  Scaling up: Meeting the Challenge of Complexity in Real-World Computing
                  Applications, {CSC} '94, Phoenix, Arizona, USA, March 8-10, 1994},
  pages        = {364--371},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/197530.197653},
  doi          = {10.1145/197530.197653},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acm/YoungL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/LengL92,
  author       = {Chun{-}Wu Roger Leng and
                  Dik Lun Lee},
  title        = {Optimal Weight Assignment for Signature Generation},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {17},
  number       = {2},
  pages        = {346--373},
  year         = {1992},
  url          = {https://doi.org/10.1145/128903.128907},
  doi          = {10.1145/128903.128907},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/LengL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Schnorr91,
  author       = {Claus{-}Peter Schnorr},
  title        = {Efficient Signature Generation by Smart Cards},
  journal      = {J. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {161--174},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00196725},
  doi          = {10.1007/BF00196725},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Schnorr91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DesmedtF91,
  author       = {Yvo Desmedt and
                  Yair Frankel},
  editor       = {Joan Feigenbaum},
  title        = {Shared Generation of Authenticators and Signatures (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {457--469},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_37},
  doi          = {10.1007/3-540-46766-1\_37},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DesmedtF91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OngS90,
  author       = {H. Ong and
                  Claus{-}Peter Schnorr},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Fast Signature Generation With a Fiat Shamir-Like Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {432--440},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_38},
  doi          = {10.1007/3-540-46877-3\_38},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OngS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics