Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "signature generation"
@article{DBLP:journals/mta/PandeyBS24, author = {Sachi Pandey and Ritin Behl and Amit Sinha}, title = {Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment}, journal = {Multim. Tools Appl.}, volume = {83}, number = {16}, pages = {47269--47293}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-17365-8}, doi = {10.1007/S11042-023-17365-8}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PandeyBS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/LazebnikK23, author = {Teddy Lazebnik and Liron Simon Keren}, title = {Cancer-inspired genomics mapper model for the generation of synthetic {DNA} sequences with desired genomics signatures}, journal = {Comput. Biol. Medicine}, volume = {164}, pages = {107221}, year = {2023}, url = {https://doi.org/10.1016/j.compbiomed.2023.107221}, doi = {10.1016/J.COMPBIOMED.2023.107221}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbm/LazebnikK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ArabNC23, author = {Naouel Arab and Hassiba Nemmour and Youcef Chibani}, title = {A new synthetic feature generation scheme based on artificial immune systems for robust offline signature verification}, journal = {Expert Syst. Appl.}, volume = {213}, number = {Part}, pages = {119306}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2022.119306}, doi = {10.1016/J.ESWA.2022.119306}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/ArabNC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/KobayashiKKO23, author = {Masaki Kobayashi and Yo Kanemoto and Daisuke Kotani and Yasuo Okabe}, title = {Generation of {IDS} Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities}, journal = {J. Inf. Process.}, volume = {31}, pages = {591--601}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.591}, doi = {10.2197/IPSJJIP.31.591}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/KobayashiKKO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SimESYKS23, author = {Minjoo Sim and Siwoo Eum and Gyeongju Song and Yujin Yang and Wonwoong Kim and Hwajeong Seo}, title = {{K-XMSS} and {K-SPHINCS+:} Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms}, journal = {Sensors}, volume = {23}, number = {17}, pages = {7558}, year = {2023}, url = {https://doi.org/10.3390/s23177558}, doi = {10.3390/S23177558}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SimESYKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/NguyenG23, author = {Duc Tri Nguyen and Kris Gaj}, editor = {Nadia El Mrabet and Luca De Feo and Sylvain Duquesne}, title = {Fast Falcon Signature Generation and Verification Using ARMv8 {NEON} Instructions}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14064}, pages = {417--441}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37679-5\_18}, doi = {10.1007/978-3-031-37679-5\_18}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/NguyenG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/RomeroMAARV23, author = {Agust{\'{\i}}n Walabonso Lara Romero and Juan Antonio Ternero Mu{\~{n}}iz and Rafael M. Estepa{-}Alonso and Antonio Jose Estepa Alonso and Fernando Ruiz Robles and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo}, editor = {Aleksandra Mileva and Steffen Wendzel and Virginia N. L. Franqueira}, title = {{HTTP} Cyberattacks Detection through Automatic Signature Generation in multi-site IoT Deployments}, booktitle = {Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference, {EICC} 2023, Stavanger, Norway, June 14-15, 2023}, pages = {65--70}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3590777.3590788}, doi = {10.1145/3590777.3590788}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eicc/RomeroMAARV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihci/KumarSRS23, author = {Suneel Kumar and Mona Singh and Ruchilekha and Manoj Kumar Singh}, editor = {Bong Jun Choi and Dhananjay Singh and Uma Shanker Tiwary and Wan{-}Young Chung}, title = {Semantic Segmentation Based Image Signature Generation for {CBIR}}, booktitle = {Intelligent Human Computer Interaction - 15th International Conference, {IHCI} 2023, Daegu, South Korea, November 8-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14532}, pages = {319--329}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53830-8\_33}, doi = {10.1007/978-3-031-53830-8\_33}, timestamp = {Mon, 11 Mar 2024 15:20:48 +0100}, biburl = {https://dblp.org/rec/conf/ihci/KumarSRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irps/MalikJCMKSBVS23, author = {Rasik Rashid Malik and Vipin Joshi and Rajarshi Roy Chaudhuri and Mehak Ashraf Mir and Zubear Khan and Avinas N. Shaji and Madhura Bhattacharya and Anup T. Vitthal and Mayank Shrivastava}, title = {Signatures of Positive Gate Over-Drive Induced Hole Trap Generation and its Impact on p-GaN Gate Stack Instability in AlGaN/GaN HEMTs}, booktitle = {{IEEE} International Reliability Physics Symposium, {IRPS} 2023, Monterey, CA, USA, March 26-30, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IRPS48203.2023.10117793}, doi = {10.1109/IRPS48203.2023.10117793}, timestamp = {Wed, 24 May 2023 09:43:44 +0200}, biburl = {https://dblp.org/rec/conf/irps/MalikJCMKSBVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/SenC23, author = {Ovishake Sen and Baibhab Chatterjee}, title = {Invited: Ring-Oscillator Physical Unclonable Function {(RO-PUF)} Based {PRBS} Generation as a Device Signature in Distributed Brain Implants}, booktitle = {66th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2023, Tempe, AZ, USA, August 6-9, 2023}, pages = {439--443}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MWSCAS57524.2023.10405893}, doi = {10.1109/MWSCAS57524.2023.10405893}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/SenC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01315, author = {Pere D{\'{\i}}az Lozano and Toni Lozano Bag{\'{e}}n and Josep Vives}, title = {Neural SDEs for Conditional Time Series Generation and the Signature-Wasserstein-1 metric}, journal = {CoRR}, volume = {abs/2301.01315}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01315}, doi = {10.48550/ARXIV.2301.01315}, eprinttype = {arXiv}, eprint = {2301.01315}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01315.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-01475, author = {Teddy Lazebnik and Liron Simon Keren}, title = {Cancer-inspired Genomics Mapper Model for the Generation of Synthetic {DNA} Sequences with Desired Genomics Signatures}, journal = {CoRR}, volume = {abs/2305.01475}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.01475}, doi = {10.48550/ARXIV.2305.01475}, eprinttype = {arXiv}, eprint = {2305.01475}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-01475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-05775, author = {Ovishake Sen and Baibhab Chatterjee}, title = {Modified Ring-Oscillator Physical Unclonable Function {(RO-PUF)} based {PRBS} Generation as a Device Signature in Distributed Brain Implants}, journal = {CoRR}, volume = {abs/2305.05775}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.05775}, doi = {10.48550/ARXIV.2305.05775}, eprinttype = {arXiv}, eprint = {2305.05775}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-05775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jetc/ThompsonW22, author = {David Thompson and Haibo Wang}, title = {Integrated Power Signature Generation Circuit for IoT Abnormality Detection}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {18}, number = {1}, pages = {5:1--5:13}, year = {2022}, url = {https://doi.org/10.1145/3460476}, doi = {10.1145/3460476}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jetc/ThompsonW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coolchips/MasadaNI22, author = {Kaoru Masada and Ryohei Nakayama and Makoto Ikeda}, title = {Hardware Acceleration of Aggregate Signature Generation and Authentication by {BLS} Signature over {BLS12-381} curve}, booktitle = {{IEEE} Symposium in Low-Power and High-Speed Chips, {COOL} {CHIPS} 2022, Tokyo, Japan, April 20-22, 2022}, pages = {1--3}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/COOLCHIPS54332.2022.9772706}, doi = {10.1109/COOLCHIPS54332.2022.9772706}, timestamp = {Mon, 23 May 2022 16:36:20 +0200}, biburl = {https://dblp.org/rec/conf/coolchips/MasadaNI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/ShiWL22, author = {Zhixin Shi and Xiangyu Wang and Pengcheng Liu}, title = {{NBP-MS:} Malware Signature Generation Based on Network Behavior Profiling}, booktitle = {26th International Conference on Pattern Recognition, {ICPR} 2022, Montreal, QC, Canada, August 21-25, 2022}, pages = {1865--1870}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICPR56361.2022.9956412}, doi = {10.1109/ICPR56361.2022.9956412}, timestamp = {Thu, 01 Dec 2022 13:56:03 +0100}, biburl = {https://dblp.org/rec/conf/icpr/ShiWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChandrasekaranT21, author = {Lakshmi Chandrasekaran and Karuppuswamy Thenmozhi and John Bosco Balaguru Rayappan and Rengarajan Amirtharajan}, title = {Genetic and chaotic signatures in offspring - an encrypted generation of image family}, journal = {Multim. Tools Appl.}, volume = {80}, number = {6}, pages = {8581--8609}, year = {2021}, url = {https://doi.org/10.1007/s11042-020-09978-0}, doi = {10.1007/S11042-020-09978-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChandrasekaranT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/DuHH21, author = {Min Du and Wenjun Hu and William Hewlett}, editor = {Gianluca Demartini and Guido Zuccon and J. Shane Culpepper and Zi Huang and Hanghang Tong}, title = {AutoCombo: Automatic Malware Signature Generation Through Combination Rule Mining}, booktitle = {{CIKM} '21: The 30th {ACM} International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1 - 5, 2021}, pages = {3777--3786}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3459637.3481896}, doi = {10.1145/3459637.3481896}, timestamp = {Tue, 16 Aug 2022 23:04:38 +0200}, biburl = {https://dblp.org/rec/conf/cikm/DuHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmc2/Ikematsu21, author = {Yasuhiko Ikematsu}, editor = {Debasis Giri and Kim{-}Kwang Raymond Choo and Saminathan Ponnusamy and Weizhi Meng and Sedat Akleylek and Santi Prasad Maity}, title = {A Study on Randomness Used in Signature Generation of {UOV}}, booktitle = {Proceedings of the Seventh International Conference on Mathematics and Computing - {ICMC} 2021, Shibpur, India,}, series = {Advances in Intelligent Systems and Computing}, volume = {1412}, pages = {39--50}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-6890-6\_4}, doi = {10.1007/978-981-16-6890-6\_4}, timestamp = {Wed, 16 Mar 2022 11:12:46 +0100}, biburl = {https://dblp.org/rec/conf/icmc2/Ikematsu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/AlnujaimK21, author = {Ibrahim Alnujaim and Youngwook Kim}, title = {Application of Conditional Generative Adversarial Networks for Generation of Micro-Doppler Signatures of Different Aspect Angles}, booktitle = {{IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2021, Brussels, Belgium, July 11-16, 2021}, pages = {5056--5058}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IGARSS47720.2021.9553743}, doi = {10.1109/IGARSS47720.2021.9553743}, timestamp = {Tue, 19 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/AlnujaimK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/SongHWTW21, author = {Yifeng Song and Xiao Hu and Wenhao Wang and Jing Tian and Zhongfeng Wang}, title = {High-Speed and Scalable {FPGA} Implementation of the Key Generation for the Leighton-Micali Signature Protocol}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2021, Daegu, South Korea, May 22-28, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCAS51556.2021.9401177}, doi = {10.1109/ISCAS51556.2021.9401177}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/SongHWTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/KapoorFQ21, author = {Maya Kapoor and Garrett Fuchs and Jonathan Quance}, editor = {Mauro Andreolini and Mirco Marchetti and Dimiter R. Avresky}, title = {RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection}, booktitle = {20th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2021, Boston, MA, USA, November 23-26, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NCA53618.2021.9685959}, doi = {10.1109/NCA53618.2021.9685959}, timestamp = {Tue, 08 Feb 2022 10:29:09 +0100}, biburl = {https://dblp.org/rec/conf/nca/KapoorFQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KosugeT21, author = {Haruhisa Kosuge and Hidema Tanaka}, editor = {Riham AlTawy and Andreas H{\"{u}}lsing}, title = {Simple and Memory-Efficient Signature Generation of {\textdollar}{\textbackslash}mathrm \{XMSS\{MT\}\}{\textdollar}}, booktitle = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13203}, pages = {377--397}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-99277-4\_18}, doi = {10.1007/978-3-030-99277-4\_18}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KosugeT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/FengHWWH20, author = {Qi Feng and Debiao He and Huaqun Wang and Ding Wang and Xinyi Huang}, title = {Multi-party key generation protocol for the identity-based signature scheme in the {IEEE} {P1363} standard for public key cryptography}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {6}, pages = {724--732}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2020.0096}, doi = {10.1049/IET-IFS.2020.0096}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/FengHWWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcat/ShinRIY20, author = {Jungpil Shin and Md. Abdur Rahim and Md. Rashedul Islam and Keun Soo Yun}, title = {A novel approach of cursive signature generation for personal identity}, journal = {Int. J. Comput. Appl. Technol.}, volume = {62}, number = {4}, pages = {384--394}, year = {2020}, url = {https://doi.org/10.1504/IJCAT.2020.107423}, doi = {10.1504/IJCAT.2020.107423}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcat/ShinRIY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgi/ChenHLAH20, author = {Ting Chen and Haiqing He and Dajun Li and Puyang An and Zhenyang Hui}, title = {Damage Signature Generation of Revetment Surface along Urban Rivers Using UAV-Based Mapping}, journal = {{ISPRS} Int. J. Geo Inf.}, volume = {9}, number = {4}, pages = {283}, year = {2020}, url = {https://doi.org/10.3390/ijgi9040283}, doi = {10.3390/IJGI9040283}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgi/ChenHLAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/RuizLSV20, author = {Victoria Ru{\'{\i}}z and Ismael Linares and {\'{A}}ngel S{\'{a}}nchez and Jos{\'{e}} Francisco V{\'{e}}lez}, title = {Off-line handwritten signature verification using compositional synthetic generation of signatures and Siamese Neural Networks}, journal = {Neurocomputing}, volume = {374}, pages = {30--41}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2019.09.041}, doi = {10.1016/J.NEUCOM.2019.09.041}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/RuizLSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaiscr/ZalasinskiCLWP20, author = {Marcin Zalasinski and Krzysztof Cpalka and Lukasz Laskowski and Donald C. Wunsch and Krzysztof Przybyszewski}, title = {An Algorithm for the Evolutionary-Fuzzy Generation of on-Line Signature Hybrid Descriptors}, journal = {J. Artif. Intell. Soft Comput. Res.}, volume = {10}, number = {3}, pages = {173--187}, year = {2020}, url = {https://doi.org/10.2478/jaiscr-2020-0012}, doi = {10.2478/JAISCR-2020-0012}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaiscr/ZalasinskiCLWP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nar/StathiasTKVCFPT20, author = {Vasileios Stathias and John Paul Turner and Amar Koleti and Dusica Vidovic and Daniel J. Cooper and Mehdi Fazel{-}Najafabadi and Marcin Pilarczyk and Raymond Terryn and Caty Chung and Afoma Umeano and Daniel J. B. Clarke and Alexander Lachmann and John Erol Evangelista and Avi Ma'ayan and Mario Medvedovic and Stephan C. Sch{\"{u}}rer}, title = {{LINCS} Data Portal 2.0: next generation access point for perturbation-response signatures}, journal = {Nucleic Acids Res.}, volume = {48}, number = {Database-Issue}, pages = {D431--D439}, year = {2020}, url = {https://doi.org/10.1093/nar/gkz1023}, doi = {10.1093/NAR/GKZ1023}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nar/StathiasTKVCFPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/KaurS20, author = {Sanmeet Kaur and Maninder Singh}, title = {Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks}, journal = {Neural Comput. Appl.}, volume = {32}, number = {12}, pages = {7859--7877}, year = {2020}, url = {https://doi.org/10.1007/s00521-019-04187-9}, doi = {10.1007/S00521-019-04187-9}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/KaurS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/NahmiasCNE20, author = {Daniel Nahmias and Aviad Cohen and Nir Nissim and Yuval Elovici}, title = {Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments}, journal = {Neural Networks}, volume = {124}, pages = {243--257}, year = {2020}, url = {https://doi.org/10.1016/j.neunet.2020.01.003}, doi = {10.1016/J.NEUNET.2020.01.003}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nn/NahmiasCNE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/KimLH20, author = {Gyu{-}Chol Kim and Su{-}Chol Li and Hak{-}Chol Hwang}, title = {Fast rebalanced {RSA} signature scheme with typical prime generation}, journal = {Theor. Comput. Sci.}, volume = {830-831}, pages = {1--19}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.04.024}, doi = {10.1016/J.TCS.2020.04.024}, timestamp = {Wed, 03 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/KimLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/ZitarNHA20, author = {Raed Abu Zitar and Mirna Nachouki and Hanan Hussain and Farid Alzboun}, editor = {Qiang Zheng and Xiaopeng Zheng and Xiangfu Zhao and Weiqing Yan and Nan Zhang and Lipo Wang}, title = {Recurrent Neural Networks for Signature Generation}, booktitle = {13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2020, Chengdu, China, October 17-19, 2020}, pages = {1093--1097}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CISP-BMEI51763.2020.9263638}, doi = {10.1109/CISP-BMEI51763.2020.9263638}, timestamp = {Fri, 30 Apr 2021 12:35:39 +0200}, biburl = {https://dblp.org/rec/conf/bmei/ZitarNHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/LongX20, author = {Yihong Long and Feng Xiong}, title = {Collaborative Generations Of Sm9 Private Key And Digital Signature Using Homomorphic Encryption}, booktitle = {5th International Conference on Computer and Communication Systems, {ICCCS} 2020, Shanghai, China, May 15-18, 2020}, pages = {76--81}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCS49078.2020.9118464}, doi = {10.1109/ICCCS49078.2020.9118464}, timestamp = {Mon, 02 Aug 2021 08:40:32 +0200}, biburl = {https://dblp.org/rec/conf/ccoms/LongX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kokoris-KogiasM20, author = {Eleftherios Kokoris{-}Kogias and Dahlia Malkhi and Alexander Spiegelman}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1751--1767}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423364}, doi = {10.1145/3372297.3423364}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kokoris-KogiasM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/WeirSD20, author = {Nathaniel Weir and Jo{\~{a}}o Sedoc and Benjamin Van Durme}, editor = {Bonnie Webber and Trevor Cohn and Yulan He and Yang Liu}, title = {{COD3S:} Diverse Generation with Discrete Semantic Signatures}, booktitle = {Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2020, Online, November 16-20, 2020}, pages = {5199--5211}, publisher = {Association for Computational Linguistics}, year = {2020}, url = {https://doi.org/10.18653/v1/2020.emnlp-main.421}, doi = {10.18653/V1/2020.EMNLP-MAIN.421}, timestamp = {Wed, 23 Mar 2022 10:11:55 +0100}, biburl = {https://dblp.org/rec/conf/emnlp/WeirSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewdts/ChesnokovKCSCP20, author = {Nikita I. Chesnokov and Denis A. Korochentsev and Larissa V. Cherckesova and Olga A. Safaryan and Vladislav E. Chumakov and Irina A. Pilipenko}, title = {Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation}, booktitle = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna, Bulgaria, September 4-7, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EWDTS50664.2020.9224967}, doi = {10.1109/EWDTS50664.2020.9224967}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ewdts/ChesnokovKCSCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LongX20, author = {Yihong Long and Feng Xiong}, title = {Secret Sharing Based {BLMQ} Signature Generation}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {6--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377655}, doi = {10.1145/3377644.3377655}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LongX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/YeL20, author = {Wenlan Ye and Yihong Long}, title = {Two Party Generation of {SM9} Digital Signature}, booktitle = {20th {IEEE} International Conference on Communication Technology, {ICCT} 2020, Nanning, China, October 28-31, 2020}, pages = {1556--1560}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCT50939.2020.9295863}, doi = {10.1109/ICCT50939.2020.9295863}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icct/YeL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/ThompsonSW20, author = {David E. Thompson and Md Kamruzzaman Shuvo and Haibo Wang}, title = {Digital {LDO} Based Power Signature Generation Circuit for IoT Security}, booktitle = {63rd {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2020, Springfield, MA, USA, August 9-12, 2020}, pages = {1076--1079}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/MWSCAS48704.2020.9184550}, doi = {10.1109/MWSCAS48704.2020.9184550}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/ThompsonSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/KajitaONT20, author = {Kaisei Kajita and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi}, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Short Lattice Signatures in the Standard Model with Efficient Tag Generation}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {85--102}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_5}, doi = {10.1007/978-3-030-62576-4\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/KajitaONT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FengHLLC20, author = {Qi Feng and Debiao He and Min Luo and Zengxiang Li and Kim{-}Kwang Raymond Choo}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {137--147}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00031}, doi = {10.1109/TRUSTCOM50675.2020.00031}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FengHLLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangTCXLX20, author = {Runzi Zhang and Mingkai Tong and Lei Chen and Jianxin Xue and Wenmao Liu and Feng Xie}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {736--743}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00101}, doi = {10.1109/TRUSTCOM50675.2020.00101}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangTCXLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-02882, author = {Nathaniel Weir and Jo{\~{a}}o Sedoc and Benjamin Van Durme}, title = {{COD3S:} Diverse Generation with Discrete Semantic Signatures}, journal = {CoRR}, volume = {abs/2010.02882}, year = {2020}, url = {https://arxiv.org/abs/2010.02882}, eprinttype = {arXiv}, eprint = {2010.02882}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-02882.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eecs/JagadeeshDBR19, author = {Kokila Jagadeesh and Arjun Murali Das and B. Shameedha Begum and Natarajan Ramasubramanian}, title = {Hardware Signature Generation Using a Hybrid {PUF} and {FSM} Model for an SoC Architecture}, journal = {Period. Polytech. Electr. Eng. Comput. Sci.}, volume = {63}, number = {4}, pages = {244--253}, year = {2019}, url = {https://doi.org/10.3311/ppee.13424}, doi = {10.3311/PPEE.13424}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eecs/JagadeeshDBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ItoK19, author = {Hiroshi Ito and Tadashi Kasezawa}, title = {Permutation-Based Signature Generation for Spread-Spectrum Video Watermarking}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {1}, pages = {31--40}, year = {2019}, url = {https://doi.org/10.1587/transinf.2018MUP0005}, doi = {10.1587/TRANSINF.2018MUP0005}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ItoK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChangLLGP19, author = {Chin{-}Chen Chang and Wai{-}Kong Lee and Yanjun Liu and Bok{-}Min Goi and Raphael C.{-}W. Phan}, title = {Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by {GPU}}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4448--4461}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2881425}, doi = {10.1109/JIOT.2018.2881425}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ChangLLGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZhaoYZ19, author = {Pu Zhao and Jia Yu and Hanlin Zhang}, title = {Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing}, journal = {J. Inf. Sci. Eng.}, volume = {35}, number = {3}, pages = {635--650}, year = {2019}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=168\_2242}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ZhaoYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/BaeKA19, author = {Tae{-}Wuk Bae and Young{-}Choon Kim and Sang{-}Ho Ahn}, title = {{IR} Composite Image Generation by Wavelength Band Based on Temperature Synthesis Estimated from {IR} Target Signature and Background Scene}, journal = {J. Sensors}, volume = {2019}, pages = {9423976:1--9423976:17}, year = {2019}, url = {https://doi.org/10.1155/2019/9423976}, doi = {10.1155/2019/9423976}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/BaeKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ats/HiramotoOT19, author = {Yushiro Hiramoto and Satoshi Ohtake and Hiroshi Takahashi}, title = {A Built-In Self-Diagnostic Mechanism for Delay Faults Based on Self-Generation of Expected Signatures}, booktitle = {28th {IEEE} Asian Test Symposium, {ATS} 2019, Kolkata, India, December 10-13, 2019}, pages = {31--36}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ATS47505.2019.000-4}, doi = {10.1109/ATS47505.2019.000-4}, timestamp = {Tue, 14 Jan 2020 13:20:27 +0100}, biburl = {https://dblp.org/rec/conf/ats/HiramotoOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LongC19, author = {Yihong Long and Minyang Cheng}, title = {Secret Sharing Based {SM2} Digital Signature Generation using Homomorphic Encryption}, booktitle = {15th International Conference on Computational Intelligence and Security, {CIS} 2019, Macao, SAR, China, December 13-16, 2019}, pages = {252--256}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIS.2019.00060}, doi = {10.1109/CIS.2019.00060}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LongC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ShanYGJWL19, author = {Weijun Shan and Jun Yu and Limin Guo and Kun Jiang and Lihui Wang and Qing Li}, title = {A Horizontal Attack on {SM9} Signature Generation}, booktitle = {15th International Conference on Computational Intelligence and Security, {CIS} 2019, Macao, SAR, China, December 13-16, 2019}, pages = {306--309}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIS.2019.00071}, doi = {10.1109/CIS.2019.00071}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/ShanYGJWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/Zhdanov19, author = {Alexander Zhdanov}, title = {Generation of Static YARA-Signatures Using Genetic Algorithm}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {220--228}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSPW.2019.00031}, doi = {10.1109/EUROSPW.2019.00031}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/Zhdanov19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnss/QiuLW19, author = {Jian Qiu and Hengjian Li and Xiyu Wang}, editor = {Robin Doss and Selwyn Piramuthu and Wei Zhou}, title = {Cancelable Palmprint Feature Generation Method Based on Minimum Signature}, booktitle = {Future Network Systems and Security - 5th International Conference, {FNSS} 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1113}, pages = {118--127}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34353-8\_8}, doi = {10.1007/978-3-030-34353-8\_8}, timestamp = {Fri, 27 Mar 2020 08:58:51 +0100}, biburl = {https://dblp.org/rec/conf/fnss/QiuLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaiic/ChoiKPC19, author = {Kiho Choi and Hyeongrae Kim and Daejin Park and Jeonghun Cho}, title = {Automatic Multi-Thread Code Generation for Monitoring Signature-based Control Flow}, booktitle = {International Conference on Artificial Intelligence in Information and Communication, {ICAIIC} 2019, Okinawa, Japan, February 11-13, 2019}, pages = {28--33}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICAIIC.2019.8668997}, doi = {10.1109/ICAIIC.2019.8668997}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/icaiic/ChoiKPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbk/ZhangHHCT19, author = {Yuanming Zhang and Ting Han and Zelin Hao and Yu Cao and Jing Tao}, editor = {Yunjun Gao and Ralf M{\"{o}}ller and Xindong Wu and Ramamohanarao Kotagiri}, title = {An Efficient Application Traffic Signature Generation System}, booktitle = {2019 {IEEE} International Conference on Big Knowledge, {ICBK} 2019, Beijing, China, November 10-11, 2019}, pages = {341--347}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICBK.2019.00053}, doi = {10.1109/ICBK.2019.00053}, timestamp = {Tue, 21 Jan 2020 16:26:02 +0100}, biburl = {https://dblp.org/rec/conf/icbk/ZhangHHCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/NahmiasCNE19, author = {Daniel Nahmias and Aviad Cohen and Nir Nissim and Yuval Elovici}, title = {TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IJCNN.2019.8851841}, doi = {10.1109/IJCNN.2019.8851841}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/NahmiasCNE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-00154, author = {Saeed Valizadeh and Marten van Dijk}, title = {On the Convergence Rates of Learning-based Signature Generation Schemes to Contain Self-propagating Malware}, journal = {CoRR}, volume = {abs/1905.00154}, year = {2019}, url = {http://arxiv.org/abs/1905.00154}, eprinttype = {arXiv}, eprint = {1905.00154}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00154.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AtzeniDMSST18, author = {Andrea S. Atzeni and Fernando Diaz and Andrea Marcelli and Antonio S{\'{a}}nchez and Giovanni Squillero and Alberto Paolo Tonda}, title = {Countering Android Malware: {A} Scalable Semi-Supervised Approach for Family-Signature Generation}, journal = {{IEEE} Access}, volume = {6}, pages = {59540--59556}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2874502}, doi = {10.1109/ACCESS.2018.2874502}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AtzeniDMSST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/YiN18, author = {Haibo Yi and Zhe Nie}, title = {High-speed hardware architecture for implementations of multivariate signature generations on FPGAs}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {93}, year = {2018}, url = {https://doi.org/10.1186/s13638-018-1117-2}, doi = {10.1186/S13638-018-1117-2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/YiN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SugiyamaAI18, author = {Shotaro Sugiyama and Hiromitsu Awano and Makoto Ikeda}, title = {Low Latency 256-bit {\textdollar}mathbb\{F\}{\_}p{\textdollar} {ECDSA} Signature Generation Crypto Processor}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {12}, pages = {2290--2296}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.2290}, doi = {10.1587/TRANSFUN.E101.A.2290}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SugiyamaAI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PengT18, author = {Zhiniang Peng and Shaohua Tang}, title = {Circulant {UOV:} a new {UOV} variant with shorter private key and faster signature generation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {3}, pages = {1376--1395}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.03.022}, doi = {10.3837/TIIS.2018.03.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PengT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/SijaSK18, author = {Baraka D. Sija and Kyu{-}Seok Shim and Myung{-}Sup Kim}, title = {Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {4}, pages = {1572--1593}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.04.010}, doi = {10.3837/TIIS.2018.04.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/SijaSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/MengT18, author = {Lei Meng and Lin Teng}, title = {Karhunen Loeve Transform-based Online Handwritten Signature Scheme via Dynamic Bit Allocation Method and Naive Bayes for Biometric Key Generation}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {9}, number = {4}, pages = {896--903}, year = {2018}, url = {http://bit.kuas.edu.tw/\&\#126;jihmsp/2018/vol9/JIH-MSP-2018-04-012.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/MengT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwe/TangLC18, author = {Yazhe Tang and Xun Li and Lishui Chen}, title = {{STAFF:} Automated Signature Generationfor Fine-Grained FunctionTraffic Identification}, journal = {J. Web Eng.}, volume = {17}, number = {5}, pages = {71--94}, year = {2018}, url = {https://doi.org/10.13052/jwe1540-9589.1753}, doi = {10.13052/JWE1540-9589.1753}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jwe/TangLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LeeKLCYLL18, author = {Suchul Lee and Sungho Kim and Sungil Lee and Jaehyuk Choi and Hanjun Yoon and Dohoon Lee and Jun{-}Rak Lee}, title = {LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {771--783}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2609907}, doi = {10.1109/TDSC.2016.2609907}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LeeKLCYLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asscc/SugiyamaAI18, author = {Shotaro Sugiyama and Hiromitsu Awano and Makoto Ikeda}, title = {31.3 {\(\mu\)}s/Signature-Generation 256-bit {\unicode{54589}}p {ECDSA} Cryptoprocessor}, booktitle = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2018, Tainan, Taiwan, November 5-7, 2018}, pages = {153--156}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ASSCC.2018.8579287}, doi = {10.1109/ASSCC.2018.8579287}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asscc/SugiyamaAI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlhanahnahLYZC18, author = {Mohannad Alhanahnah and Qicheng Lin and Qiben Yan and Ning Zhang and Zhenxiang Chen}, title = {Efficient Signature Generation for Classifying Cross-Architecture IoT Malware}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433203}, doi = {10.1109/CNS.2018.8433203}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlhanahnahLYZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/OzdilEDO18, author = {Omer Ozdil and Yunus Emre Esin and Berkan Demirel and Safak Ozturk}, title = {Representative Signature Generation for Plant Detection in Hyperspectral Images}, booktitle = {2018 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2018, Valencia, Spain, July 22-27, 2018}, pages = {2709--2712}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IGARSS.2018.8517344}, doi = {10.1109/IGARSS.2018.8517344}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/OzdilEDO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iseaisap/NaderiVCPA18, author = {Hassan Naderi and P. Vinod and Mauro Conti and Saeed Parsa and Mohammad Hadi Alaeiyan}, editor = {Sukumar Nandi and Devesh Jinwala and Virendra Singh and Vijay Laxmi and Manoj Singh Gaur and Parvez Faruki}, title = {Malware Signature Generation Using Locality Sensitive Hashing}, booktitle = {Security and Privacy - Second {ISEA} International Conference, {ISEA-ISAP} 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {939}, pages = {115--124}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-7561-3\_9}, doi = {10.1007/978-981-13-7561-3\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iseaisap/NaderiVCPA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PengT17, author = {Zhiniang Peng and Shaohua Tang}, title = {Circulant Rainbow: {A} New Rainbow Variant With Shorter Private Key and Faster Signature Generation}, journal = {{IEEE} Access}, volume = {5}, pages = {11877--11886}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2717279}, doi = {10.1109/ACCESS.2017.2717279}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PengT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ShimYLK17, author = {Kyu{-}Seok Shim and Sung{-}Ho Yoon and Su{-}Kang Lee and Myung{-}Sup Kim}, title = {SigBox: Automatic Signature Generation Method for Fine-grained Traffic Identification}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {2}, pages = {537--569}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=155\_2012}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ShimYLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocs/Niewiadomska-Szynkiewicz17, author = {Ewa Niewiadomska{-}Szynkiewicz and Adam Kozakiewicz}, title = {Design and evaluation of a system for network threat signatures generation}, journal = {J. Comput. Sci.}, volume = {22}, pages = {187--197}, year = {2017}, url = {https://doi.org/10.1016/j.jocs.2017.05.006}, doi = {10.1016/J.JOCS.2017.05.006}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocs/Niewiadomska-Szynkiewicz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/CabreraFES17, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Miguel A. Ferrer and George S. Eskander and Robert Sabourin}, title = {Generation of Duplicated Off-Line Signature Images for Verification Systems}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {39}, number = {5}, pages = {951--964}, year = {2017}, url = {https://doi.org/10.1109/TPAMI.2016.2560810}, doi = {10.1109/TPAMI.2016.2560810}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/CabreraFES17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/ShahriarB17, author = {Hossain Shahriar and William Bond}, title = {Towards an Attack Signature Generation Framework for Intrusion Detection Systems}, booktitle = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017}, pages = {597--603}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.106}, doi = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.106}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/ShahriarB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/BuneevaR17, author = {Nadezda Buneeva and Andreas Reinhardt}, title = {{AMBAL:} Realistic load signature generation for load disaggregation performance evaluation}, booktitle = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, pages = {443--448}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SmartGridComm.2017.8340657}, doi = {10.1109/SMARTGRIDCOMM.2017.8340657}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/BuneevaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-08336, author = {Eli David and Nathan S. Netanyahu}, title = {DeepSign: Deep Learning for Automatic Malware Signature Generation and Classification}, journal = {CoRR}, volume = {abs/1711.08336}, year = {2017}, url = {http://arxiv.org/abs/1711.08336}, eprinttype = {arXiv}, eprint = {1711.08336}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-08336.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShaoKVP16, author = {Min Shao and Min Sik Kim and Victor C. Valgenti and Jungkeun Park}, title = {Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {8}, pages = {2090--2099}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015EDP7483}, doi = {10.1587/TRANSINF.2015EDP7483}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShaoKVP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TamuraI16, author = {Masato Tamura and Makoto Ikeda}, title = {Montgomery Multiplier Design for {ECDSA} Signature Generation Processor}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {12}, pages = {2444--2452}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.2444}, doi = {10.1587/TRANSFUN.E99.A.2444}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TamuraI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/SalazarTP16, author = {Jos{\'{e}} Luis Salazar and Jos{\'{e}} Luis Tornos and Joan Josep Piles}, title = {Efficient ways of prime number generation for ring signatures}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {1}, pages = {33--36}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2014.0547}, doi = {10.1049/IET-IFS.2014.0547}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SalazarTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asscc/TamuraI16, author = {Masato Tamura and Makoto Ikeda}, title = {1.68{\(\mu\)}J/signature-generation 256-bit {ECDSA} over GF(p) signature generator for IoT devices}, booktitle = {{IEEE} Asian Solid-State Circuits Conference, {A-SSCC} 2016, Toyama, Japan, November 7-9, 2016}, pages = {341--344}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ASSCC.2016.7844205}, doi = {10.1109/ASSCC.2016.7844205}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/asscc/TamuraI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/JupinSD16, author = {Joseph Jupin and Justin Y. Shi and Eduard C. Dragut}, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {{PSH:} {A} probabilistic signature hash method with hash neighborhood candidate generation for fast edit-distance string comparison on big data}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {122--127}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BigData.2016.7840596}, doi = {10.1109/BIGDATA.2016.7840596}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/JupinSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BohmerR16, author = {Kristof B{\"{o}}hmer and Stefanie Rinderle{-}Ma}, editor = {Rainer Schmidt and Wided Gu{\'{e}}dria and Ilia Bider and S{\'{e}}rgio Guerreiro}, title = {Automatic Signature Generation for Anomaly Detection in Business Process Instance Data}, booktitle = {Enterprise, Business-Process and Information Systems Modeling - 17th International Conference, {BPMDS} 2016, 21st International Conference, {EMMSAD} 2016, Held at CAiSE 2016, Ljubljana, Slovenia, June 13-14, 2016, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {248}, pages = {196--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39429-9\_13}, doi = {10.1007/978-3-319-39429-9\_13}, timestamp = {Fri, 19 Mar 2021 08:43:31 +0100}, biburl = {https://dblp.org/rec/conf/caise/BohmerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/SowaSYM16, author = {Taiki Sowa and Suguru Sunada and Yasushi Yamazaki and Takeru Miyazaki}, title = {Biometric Bit String Generation from Handwritten Signatures on Smart Device}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {662--665}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0118}, doi = {10.1109/CANDAR.2016.0118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/SowaSYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/Kim0X16, author = {Jongik Kim and Chen Li and Xiaohui Xie}, title = {Hobbes3: Dynamic generation of variable-length signatures for efficient approximate subsequence mappings}, booktitle = {32nd {IEEE} International Conference on Data Engineering, {ICDE} 2016, Helsinki, Finland, May 16-20, 2016}, pages = {169--180}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICDE.2016.7498238}, doi = {10.1109/ICDE.2016.7498238}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/Kim0X16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfhr/CabreraCFBMCAP16, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Sukalpa Chanda and Miguel A. Ferrer and Chayan Kumar Banerjee and Anirban Majumdar and Cristina Carmona{-}Duarte and Parikshit Acharya and Umapada Pal}, title = {Multiple Generation of Bengali Static Signatures}, booktitle = {15th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2016, Shenzhen, China, October 23-26, 2016}, pages = {42--47}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICFHR.2016.0021}, doi = {10.1109/ICFHR.2016.0021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/CabreraCFBMCAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/ChoiLCKK16a, author = {Sunoh Choi and Jooyoung Lee and Yangseo Choi and Jonghyun Kim and Ikkyun Kim}, title = {Hierarchical network signature clustering and generation}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21, 2016}, pages = {1191--1193}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICTC.2016.7763403}, doi = {10.1109/ICTC.2016.7763403}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ictc/ChoiLCKK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwci/ChakrabortyRRU16, author = {Narayan Ranjan Chakraborty and Muhammad Taifur Rahman and Md. Ekhlasur Rahman and Mohammad Shorif Uddin}, title = {Generation and verification of digital signature with two factor authentication}, booktitle = {2016 International Workshop on Computational Intelligence {(IWCI} 2016), Dhaka, Bangladesh, December 12-13, 2016}, pages = {131--135}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IWCI.2016.7860353}, doi = {10.1109/IWCI.2016.7860353}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/iwci/ChakrabortyRRU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Vasilomanolakis16a, author = {Emmanouil Vasilomanolakis and Shreyas Srinivasa and Carlos Garcia Cordero and Max M{\"{u}}hlh{\"{a}}user}, editor = {Sema Oktug and Mehmet Ulema and Cicek Cavdar and Lisandro Zambenedetti Granville and Carlos Raniery Paula dos Santos}, title = {Multi-stage attack detection and signature generation with {ICS} honeypots}, booktitle = {2016 {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2016, Istanbul, Turkey, April 25-29, 2016}, pages = {1227--1232}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NOMS.2016.7502992}, doi = {10.1109/NOMS.2016.7502992}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/Vasilomanolakis16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rait/BhowmickSMB16, author = {Shib Sankar Bhowmick and Indrajit Saha and Ujjwal Maulik and Debotosh Bhattacharjee}, title = {Identification of miRNA signature using Next-Generation Sequencing data of prostate cancer}, booktitle = {2016 3rd International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 3-5, 2016}, pages = {528--533}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RAIT.2016.7507956}, doi = {10.1109/RAIT.2016.7507956}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rait/BhowmickSMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcloud/ShangPLL16, author = {Tao Shang and Tianli Peng and Qi Lei and Jianwei Liu}, title = {Homomorphic Signature for Generation-based Network Coding}, booktitle = {2016 {IEEE} International Conference on Smart Cloud, SmartCloud 2016, New York, NY, USA, November 18-20, 2016}, pages = {269--273}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SmartCloud.2016.59}, doi = {10.1109/SMARTCLOUD.2016.59}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartcloud/ShangPLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/WangW16, author = {Jie Wang and Jie Wu}, editor = {Guojun Wang and Indrakshi Ray and Jos{\'{e}} M. Alcaraz Calero and Sabu M. Thampi}, title = {A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic Worm}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10066}, pages = {109--121}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49148-6\_10}, doi = {10.1007/978-3-319-49148-6\_10}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Garcia-TeodoroD15, author = {Pedro Garc{\'{\i}}a{-}Teodoro and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Juan E. Tapiador and Rolando Salazar{-}Hern{\'{a}}ndez}, title = {Automatic generation of {HTTP} intrusion signatures by selective identification of anomalies}, journal = {Comput. Secur.}, volume = {55}, pages = {159--174}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.007}, doi = {10.1016/J.COSE.2015.09.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Garcia-TeodoroD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Horng15, author = {Gwoboa Horng}, title = {Accelerating {DSA} Signature Generation}, journal = {Cryptologia}, volume = {39}, number = {2}, pages = {121--125}, year = {2015}, url = {https://doi.org/10.1080/01611194.2014.915262}, doi = {10.1080/01611194.2014.915262}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Horng15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssc/KuzunoT15, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Detection of sensitive information leakage in Android applications using signature generation}, journal = {Int. J. Space Based Situated Comput.}, volume = {5}, number = {1}, pages = {53--62}, year = {2015}, url = {https://doi.org/10.1504/IJSSC.2015.067998}, doi = {10.1504/IJSSC.2015.067998}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssc/KuzunoT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HaoWLR15, author = {Sun Hao and Wen Wang and Huabiao Lu and Peige Ren}, title = {AutoMal: automatic clustering and signature generation for malwares based on the network flow}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1845--1854}, year = {2015}, url = {https://doi.org/10.1002/sec.1029}, doi = {10.1002/SEC.1029}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HaoWLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TanT15, author = {Yang Tan and Shaohua Tang}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Two Approaches to Build {UOV} Variants with Shorter Private Key and Faster Signature Generation}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {57--74}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_4}, doi = {10.1007/978-3-319-38898-4\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TanT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangH15, author = {Jie Wang and Xiaoxian He}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {A Novel Signature Generation Approach for Polymorphic Worms}, booktitle = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9530}, pages = {369--382}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27137-8\_28}, doi = {10.1007/978-3-319-27137-8\_28}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/DavidN15, author = {Omid E. David and Nathan S. Netanyahu}, title = {DeepSign: Deep learning for automatic malware signature generation and classification}, booktitle = {2015 International Joint Conference on Neural Networks, {IJCNN} 2015, Killarney, Ireland, July 12-17, 2015}, pages = {1--8}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IJCNN.2015.7280815}, doi = {10.1109/IJCNN.2015.7280815}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/DavidN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XuLMMBNA15, author = {Qiang Xu and Yong Liao and Stanislav Miskovic and Zhuoqing Morley Mao and Mario Baldi and Antonio Nucci and Thomas Andrews}, title = {Automatic generation of mobile app signatures from traffic observations}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {1481--1489}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218526}, doi = {10.1109/INFOCOM.2015.7218526}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XuLMMBNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WangH15, author = {Jie Wang and Xiaoxian He}, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {A Signature Generation Approach Based on Clustering for Polymorphic Worm}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, pages = {84--96}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_6}, doi = {10.1007/978-3-319-31550-8\_6}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CashDK15, author = {David Cash and Rafael Dowsley and Eike Kiltz}, editor = {Jonathan Katz}, title = {Digital Signatures from Strong {RSA} without Prime Generation}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {217--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_10}, doi = {10.1007/978-3-662-46447-2\_10}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CashDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/YangWZ14, author = {Lili Yang and Jie Wang and Ping Zhong}, editor = {Xian{-}He Sun and Wenyu Qu and Ivan Stojmenovic and Wanlei Zhou and Zhiyang Li and Hua Guo and Geyong Min and Tingting Yang and Yulei Wu and Lei (Chris) Liu}, title = {Combining Supervised and Unsupervised Learning for Automatic Attack Signature Generation System}, booktitle = {Algorithms and Architectures for Parallel Processing - 14th International Conference, {ICA3PP} 2014, Dalian, China, August 24-27, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8630}, pages = {607--618}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11197-1\_47}, doi = {10.1007/978-3-319-11197-1\_47}, timestamp = {Fri, 22 Apr 2022 17:07:03 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/YangWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfhr/CabreraGMFG14, author = {Mois{\'{e}}s D{\'{\i}}az Cabrera and Marta Gomez{-}Barrero and Aythami Morales and Miguel Angel Ferrer{-}Ballester and Javier Galbally}, title = {Generation of Enhanced Synthetic Off-Line Signatures Based on Real On-Line Data}, booktitle = {14th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2014, Crete, Greece, September 1-4, 2014}, pages = {482--487}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICFHR.2014.87}, doi = {10.1109/ICFHR.2014.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/CabreraGMFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/AydinAB14, author = {Abdulbaki Aydin and Muath Alkhalaf and Tevfik Bultan}, title = {Automated Test Generation from Vulnerability Signatures}, booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, {USA}}, pages = {193--202}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICST.2014.32}, doi = {10.1109/ICST.2014.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/AydinAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/HobeikaPLTBA14, author = {Christelle Hobeika and Simon Pichette and M. A. Leonard and Claude Thibeault and Jean{-}Fran{\c{c}}ois Boland and Yves Audet}, title = {Multi-abstraction level signature generation and comparison based on radiation single event upset}, booktitle = {2014 {IEEE} 20th International On-Line Testing Symposium, {IOLTS} 2014, Platja d'Aro, Girona, Spain, July 7-9, 2014}, pages = {212--215}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IOLTS.2014.6873700}, doi = {10.1109/IOLTS.2014.6873700}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/iolts/HobeikaPLTBA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snds/KaurS14, author = {Ratinder Kaur and Maninder Singh}, editor = {Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Sabu M. Thampi and Ryan K. L. Ko and Lei Shu}, title = {Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks}, booktitle = {Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, {SNDS} 2014, Trivandrum, India, March 13-14, 2014, Proceedings}, series = {Communications in Computer and Information Science}, volume = {420}, pages = {298--309}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54525-2\_27}, doi = {10.1007/978-3-642-54525-2\_27}, timestamp = {Sat, 19 Oct 2019 19:58:53 +0200}, biburl = {https://dblp.org/rec/conf/snds/KaurS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/KaurS13, author = {Sanmeet Kaur and Maninder Singh}, title = {Automatic Attack Signature Generation Systems: {A} Review}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {6}, pages = {54--61}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.51}, doi = {10.1109/MSP.2013.51}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/KaurS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdc/Spencer13, author = {Ross Spencer}, title = {Generation of a Skeleton Corpus of Digital Objects for the Validation and Evaluation of Format Identification Tools and Signatures}, journal = {Int. J. Digit. Curation}, volume = {8}, number = {1}, pages = {120--130}, year = {2013}, url = {https://doi.org/10.2218/ijdc.v8i1.249}, doi = {10.2218/IJDC.V8I1.249}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdc/Spencer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/AltwaijryS13, author = {Hesham Altwaijry and Khalid Shahbar}, title = {{(WHASG)} Automatic {SNORT} Signatures Generation by using Honeypot}, journal = {J. Comput.}, volume = {8}, number = {12}, pages = {3280--3286}, year = {2013}, url = {http://www.jcomputers.us/index.php?m=content\&c=index\&a=show\&catid=113\&id=1510}, doi = {10.4304/JCP.8.12.3280-3286}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/AltwaijryS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/KimC13, author = {Hwan{-}Hee Kim and Mi{-}Jung Choi}, title = {Towards automatic signature generation for identification of HTTP-based applications}, booktitle = {15th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2013, Hiroshima, Japan, September 25-27, 2013}, pages = {1--3}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6665215/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/KimC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YasudaDTS13, author = {Takanori Yasuda and Jintai Ding and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {A variant of rainbow with shorter secret key and faster signature generation}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {57--62}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484401}, doi = {10.1145/2484389.2484401}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YasudaDTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/Ferrer-BallesterCM13, author = {Miguel Angel Ferrer{-}Ballester and Mois{\'{e}}s D{\'{\i}}az Cabrera and Aythami Morales}, editor = {Julian Fi{\'{e}}rrez and Ajay Kumar and Mayank Vatsa and Raymond N. J. Veldhuis and Javier Ortega{-}Garcia}, title = {Synthetic off-line signature image generation}, booktitle = {International Conference on Biometrics, {ICB} 2013, 4-7 June, 2013, Madrid, Spain}, pages = {1--7}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICB.2013.6612969}, doi = {10.1109/ICB.2013.6612969}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/Ferrer-BallesterCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/KuzunoT13, author = {Hiroki Kuzuno and Satoshi Tonami}, editor = {Chee Yong Chan and Jiaheng Lu and Kjetil N{\o}rv{\aa}g and Egemen Tanin}, title = {Signature generation for sensitive information leakage in android applications}, booktitle = {Workshops Proceedings of the 29th {IEEE} International Conference on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12, 2013}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDEW.2013.6547438}, doi = {10.1109/ICDEW.2013.6547438}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/KuzunoT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciap/PirloIPOCGR13, author = {Giuseppe Pirlo and Donato Impedovo and Rejean Plamondon and Christian O'Reilly and A. Cozzolongo and R. Gravinese and Andrea Rollo}, editor = {Alfredo Petrosino and Lucia Maddalena and Pietro Pala}, title = {Stability of Dynamic Signatures: From the Representation to the Generation Domain}, booktitle = {New Trends in Image Analysis and Processing - {ICIAP} 2013 - {ICIAP} 2013 International Workshops, Naples, Italy, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8158}, pages = {122--130}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41190-8\_14}, doi = {10.1007/978-3-642-41190-8\_14}, timestamp = {Tue, 18 Jun 2019 15:49:52 +0200}, biburl = {https://dblp.org/rec/conf/iciap/PirloIPOCGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13, author = {Huabiao Lu and Baokang Zhao and Xiaofeng Wang and Jinshu Su}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {271--284}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_28}, doi = {10.1007/978-3-642-36818-9\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/LuZWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RafiqueC13, author = {M. Zubair Rafique and Juan Caballero}, editor = {Salvatore J. Stolfo and Angelos Stavrou and Charles V. Wright}, title = {{FIRMA:} Malware Clustering and Network Signature Generation with Mixed Network Behaviors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 16th International Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8145}, pages = {144--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41284-4\_8}, doi = {10.1007/978-3-642-41284-4\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/RafiqueC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-4045, author = {Hiroki Kuzuno and Satoshi Tonami}, title = {Signature Generation for Sensitive Information Leakage in Android Applications}, journal = {CoRR}, volume = {abs/1305.4045}, year = {2013}, url = {http://arxiv.org/abs/1305.4045}, eprinttype = {arXiv}, eprint = {1305.4045}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-4045.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/VenckauskasJMM12, author = {Algimantas Venckauskas and Nerijus Jusas and Irena Mikuckiene and Stasys Maciulevicius}, title = {Generation of the Secret Encryption Key Using the Signature of the Embedded System}, journal = {Inf. Technol. Control.}, volume = {41}, number = {4}, pages = {368--375}, year = {2012}, url = {https://doi.org/10.5755/j01.itc.41.4.1162}, doi = {10.5755/J01.ITC.41.4.1162}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/VenckauskasJMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/VogelRS12, author = {Michael Vogel and Ren{\'{e}} Rietz and Sebastian Schmerl}, title = {Automated Generation of Precise Signatures}, journal = {Prax. Inf.verarb. Kommun.}, volume = {35}, number = {1}, pages = {40--45}, year = {2012}, url = {https://doi.org/10.1515/pik-2012-0007}, doi = {10.1515/PIK-2012-0007}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/VogelRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/GalballyFOP12, author = {Javier Galbally and Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia and R{\'{e}}jean Plamondon}, title = {Synthetic on-line signature generation. Part {II:} Experimental validation}, journal = {Pattern Recognit.}, volume = {45}, number = {7}, pages = {2622--2632}, year = {2012}, url = {https://doi.org/10.1016/j.patcog.2011.12.007}, doi = {10.1016/J.PATCOG.2011.12.007}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pr/GalballyFOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/GalballyPFO12, author = {Javier Galbally and R{\'{e}}jean Plamondon and Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia}, title = {Synthetic on-line signature generation. Part {I:} Methodology and algorithms}, journal = {Pattern Recognit.}, volume = {45}, number = {7}, pages = {2610--2621}, year = {2012}, url = {https://doi.org/10.1016/j.patcog.2011.12.011}, doi = {10.1016/J.PATCOG.2011.12.011}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/GalballyPFO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccomm/SerbP12, author = {Mihai Serb and Victor Valeriu Patriciu}, title = {Using MTMs to secure electronic signatures generation}, booktitle = {9th International Conference on Communications, {COMM} 2012, Bucharest, Romania, June 21-23, 2012}, pages = {315--318}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICComm.2012.6262538}, doi = {10.1109/ICCOMM.2012.6262538}, timestamp = {Thu, 07 Apr 2022 14:06:59 +0200}, biburl = {https://dblp.org/rec/conf/iccomm/SerbP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/visapp/DOrazioG12, author = {Tiziana D'Orazio and Cataldo Guaragnella}, editor = {Gabriela Csurka and Jos{\'{e}} Braz}, title = {A Graph-based Signature Generation for People Re-identification in a Multi-camera Surveillance System}, booktitle = {{VISAPP} 2012 - Proceedings of the International Conference on Computer Vision Theory and Applications, Volume 1, Rome, Italy, 24-26 February, 2012}, pages = {414--417}, publisher = {SciTePress}, year = {2012}, timestamp = {Fri, 25 May 2012 14:48:14 +0200}, biburl = {https://dblp.org/rec/conf/visapp/DOrazioG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Hu11, author = {Xin Hu}, title = {Large Scale Malware Analysis, Detection and Signature Generation}, school = {University of Michigan, {USA}}, year = {2011}, url = {https://hdl.handle.net/2027.42/89760}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Hu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/LeeC11, author = {Mn{-}Ta Lee and Hsuan T. Chang}, title = {On the pinned field image binarization for signature generation in image ownership verification method}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2011}, pages = {44}, year = {2011}, url = {https://doi.org/10.1186/1687-6180-2011-44}, doi = {10.1186/1687-6180-2011-44}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/LeeC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KongJGZLX11, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} semantics aware signature generation for polymorphic worm detection}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {269--283}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0132-7}, doi = {10.1007/S10207-011-0132-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/TangXL11, author = {Yong Tang and Bin Xiao and Xicheng Lu}, title = {Signature Tree Generation for Polymorphic Worms}, journal = {{IEEE} Trans. Computers}, volume = {60}, number = {4}, pages = {565--579}, year = {2011}, url = {https://doi.org/10.1109/TC.2010.130}, doi = {10.1109/TC.2010.130}, timestamp = {Sun, 23 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/TangXL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/ShabtaiME11, author = {Asaf Shabtai and Eitan Menahem and Yuval Elovici}, title = {F-Sign: Automatic, Function-Based Signature Generation for Malware}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {41}, number = {4}, pages = {494--508}, year = {2011}, url = {https://doi.org/10.1109/TSMCC.2010.2068544}, doi = {10.1109/TSMCC.2010.2068544}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/ShabtaiME11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/ScheuermannBH11, author = {Dirk Scheuermann and Bastian Wolfgruber and Olaf Henniger}, editor = {Arslan Br{\"{o}}mme and Christoph Busch}, title = {On biometric key generation from handwritten signatures}, booktitle = {{BIOSIG} 2011 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 08.-09. September 2011 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-191}}, pages = {103--114}, publisher = {{GI}}, year = {2011}, url = {https://dl.gi.de/handle/20.500.12116/18532}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/ScheuermannBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/valuetools/SzaboTTMS11, author = {G{\'{e}}za Szab{\'{o}} and Zolt{\'{a}}n Richard Tur{\'{a}}nyi and L{\'{a}}szl{\'{o}} Toka and S{\'{a}}ndor Moln{\'{a}}r and Alysson Santos}, editor = {Samson Lasaulce and Dieter Fiems and Peter G. Harrison and Luc Vandendorpe}, title = {Automatic protocol signature generation framework for deep packet inspection}, booktitle = {5th International {ICST} Conference on Performance Evaluation Methodologies and Tools Communications, {VALUETOOLS} '11, Paris, France, May 16-20, 2011}, pages = {291--299}, publisher = {{ICST/ACM}}, year = {2011}, url = {https://doi.org/10.4108/icst.valuetools.2011.245606}, doi = {10.4108/ICST.VALUETOOLS.2011.245606}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/valuetools/SzaboTTMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vts/BanerjeeSDC11, author = {Aritra Banerjee and Shreyas Sen and Shyam Kumar Devarakond and Abhijit Chatterjee}, title = {Automatic test stimulus generation for accurate diagnosis of {RF} systems using transient response signatures}, booktitle = {29th {IEEE} {VLSI} Test Symposium, {VTS} 2011, May 1-5, 2011, Dana Point, California, {USA}}, pages = {58--63}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/VTS.2011.5783755}, doi = {10.1109/VTS.2011.5783755}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/vts/BanerjeeSDC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KattiK10, author = {Rajendra S. Katti and Rajesh G. Kavasseri}, title = {Nonce Generation For The Digital Signature Standard}, journal = {Int. J. Netw. Secur.}, volume = {11}, number = {1}, pages = {23--32}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v11-n1/ijns-2010-v11-n1-p23-32.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KattiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangLCFL10, author = {Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li}, title = {Thwarting zero-day polymorphic worms with network-level length-based signature generation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {53--66}, year = {2010}, url = {http://doi.acm.org/10.1145/1816288.1816293}, doi = {10.1145/1816288.1816293}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangLCFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/DurmeL10, author = {Benjamin Van Durme and Ashwin Lall}, title = {Online Generation of Locality Sensitive Hash Signatures}, booktitle = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden, Short Papers}, pages = {231--235}, publisher = {The Association for Computer Linguistics}, year = {2010}, url = {https://aclanthology.org/P10-2043/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/DurmeL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/ShezafR10, author = {Daphna Shezaf and Ari Rappoport}, editor = {Jan Hajic and Sandra Carberry and Stephen Clark}, title = {Bilingual Lexicon Generation Using Non-Aligned Signatures}, booktitle = {{ACL} 2010, Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, July 11-16, 2010, Uppsala, Sweden}, pages = {98--107}, publisher = {The Association for Computer Linguistics}, year = {2010}, url = {https://aclanthology.org/P10-1011/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/ShezafR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aict/Garcia-TeodoroMR10, author = {Pedro Garcia{-}Teodoro and Pablo Mu{\~{n}}oz{-}Feldstedt and David Ruete{-}Z{\'{u}}{\~{n}}iga}, editor = {T{\"{u}}lin Atmaca and Jacques Palicot and Amor Nafkha and Thrasyvoulos Tsiatsos and Michel Marot and Oana Dini}, title = {Automatic Signature Generation for Network Services through Selective Extraction of Anomalous Contents}, booktitle = {Sixth Advanced International Conference on Telecommunications, {AICT} 2010, 9-15 May 2010, Barcelona, Spain}, pages = {370--375}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/AICT.2010.22}, doi = {10.1109/AICT.2010.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aict/Garcia-TeodoroMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/Shoufan10, author = {Abdulhadi Shoufan}, editor = {Phaophak Sirisuk and Fearghal Morgan and Tarek A. El{-}Ghazawi and Hideharu Amano}, title = {An {FPGA} Accelerator for Hash Tree Generation in the Merkle Signature Scheme}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications, 6th International Symposium, {ARC} 2010, Bangkok, Thailand, March 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5992}, pages = {145--156}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12133-3\_15}, doi = {10.1007/978-3-642-12133-3\_15}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/arc/Shoufan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arcs/Fechner10, author = {Bernhard Fechner}, editor = {Michael Beigl and Francisco Javier Cazorla{-}Almeida}, title = {GPU-Based Parallel Signature Scanning and Hash Generation}, booktitle = {{ARCS} '10 - 23th International Conference on Architecture of Computing Systens 2010, Workshop Proceedings, February 22-23, 2010, Hannover, Germany}, pages = {133--138}, publisher = {{VDE} Verlag}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5758996/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arcs/Fechner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ChaisornSM10, author = {Lekha Chaisorn and Janya Sainui and Corey Manders}, title = {Fast and efficient video signature generation and matching for online video sharing}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, pages = {2129--2132}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICIP.2010.5652053}, doi = {10.1109/ICIP.2010.5652053}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/ChaisornSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangKP10, author = {Junxing Zhang and Sneha Kumar Kasera and Neal Patwari}, title = {Mobility Assisted Secret Key Generation Using Wireless Link Signatures}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {261--265}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462231}, doi = {10.1109/INFCOM.2010.5462231}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/PerdisciLF10, author = {Roberto Perdisci and Wenke Lee and Nick Feamster}, title = {Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces}, booktitle = {Proceedings of the 7th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2010, April 28-30, 2010, San Jose, CA, {USA}}, pages = {391--404}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/nsdi10/tech/full\_papers/perdisci.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/PerdisciLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/Tang10, author = {Xinyu Tang}, title = {The Generation of Attack Signatures Based on Virtual Honeypots}, booktitle = {2010 International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2010, Wuhan, China, 8-11 December, 2010}, pages = {435--439}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PDCAT.2010.54}, doi = {10.1109/PDCAT.2010.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/Tang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KongJGZLX10, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, editor = {Sushil Jajodia and Jianying Zhou}, title = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {1--19}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_1}, doi = {10.1007/978-3-642-16161-2\_1}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LuminiN09, author = {Alessandra Lumini and Loris Nanni}, title = {Ensemble of on-line signature matchers based on OverComplete feature generation}, journal = {Expert Syst. Appl.}, volume = {36}, number = {3}, pages = {5291--5296}, year = {2009}, url = {https://doi.org/10.1016/j.eswa.2008.06.069}, doi = {10.1016/J.ESWA.2008.06.069}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LuminiN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiJS09, author = {Lixin Li and James E. Just and R. Sekar}, title = {Online Signature Generation for Windows Systems}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {289--298}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.34}, doi = {10.1109/ACSAC.2009.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadcom/MohammedCVHA09, author = {Mohssen Mohammed Zian Elaabdeen Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Ezzeldien Amin}, editor = {Tomasz Janiczek and Ryszard Klempous and Jan Nikodem and Ryszard J. Zielinski and Johnson I. Agbinya and Robin Braun and Zenon Chaczko}, title = {Signature Generation for Zero-day Polymorphic Works}, booktitle = {Selected Papers on Broadband Communication, Information Technology {\&} Biomedical Applications, BroadBandCom 2009, Proceedings, Wroc{\l}aw, Poland, July 15-18, 2009}, pages = {295--300}, publisher = {Wroc{\l}aw University of Technology}, year = {2009}, timestamp = {Tue, 18 Apr 2023 16:23:03 +0200}, biburl = {https://dblp.org/rec/conf/broadcom/MohammedCVHA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YaoLZ09, author = {Li Yao and Yu Liu and Yuqing Zhang}, title = {An Integrated Approach to Worm Detection and Automatic Signature Generation}, booktitle = {2009 International Conference on Computational Intelligence and Security, {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers}, pages = {371--375}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CIS.2009.274}, doi = {10.1109/CIS.2009.274}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YaoLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WyschogrodD09, author = {Daniel Wyschogrod and Jeffrey Dezso}, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Using automatic signature generation as a sensor backend}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {29}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1558607.1558640}, doi = {10.1145/1558607.1558640}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WyschogrodD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/depcos/Tylman09, author = {Wojciech Tylman}, title = {Data Mining Techniques for Semi-automatic Signature Generation}, booktitle = {Fourth International Conference on Dependability of Computer Systems, DepCos-RELCOMEX '09, Brunow, Poland, June 30 - July 2, 2009}, pages = {210--217}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DepCoS-RELCOMEX.2009.24}, doi = {10.1109/DEPCOS-RELCOMEX.2009.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/depcos/Tylman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangWCZ09, author = {Jie Wang and Jianxin Wang and Jianer Chen and Xi Zhang}, title = {An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198721}, doi = {10.1109/ICC.2009.5198721}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangWCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GriffinSHC09, author = {Kent Griffin and Scott Schneider and Xin Hu and Tzi{-}cker Chiueh}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Automatic Generation of String Signatures for Malware Detection}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {101--120}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_6}, doi = {10.1007/978-3-642-04342-0\_6}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/GriffinSHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsea/LiXYW08, author = {Nan Li and Chunhe Xia and Yi Yang and Haiquan Wang}, title = {An Algorithm for Generation of Attack Signatures Based on Sequences Alignment}, journal = {J. Softw. Eng. Appl.}, volume = {1}, number = {1}, pages = {76--82}, year = {2008}, url = {https://doi.org/10.4236/jsea.2008.11011}, doi = {10.4236/JSEA.2008.11011}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsea/LiXYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrumleyNSWJ08, author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha}, title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.55}, doi = {10.1109/TDSC.2008.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WangLCXRK08, author = {XiaoFeng Wang and Zhuowei Li and Jong Youl Choi and Jun Xu and Michael K. Reiter and Chongkyung Kil}, title = {Fast and Black-box Exploit Detection and Signature Generation for Commodity Software}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {11:1--11:35}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455523}, doi = {10.1145/1455518.1455523}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WangLCXRK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08, author = {V. Sai Sathyanarayan and Pankaj Kohli and Bezawada Bruhadeshwar}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Signature Generation and Detection of Malware Families}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {336--349}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_25}, doi = {10.1007/978-3-540-70500-0\_25}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SathyanarayanKB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NandaC08, author = {Susanta Nanda and Tzi{-}cker Chiueh}, title = {Execution Trace-Driven Automated Attack Signature Generation}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {195--204}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.58}, doi = {10.1109/ACSAC.2008.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NandaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/BalasubramanianCBRD08, author = {Sundar Balasubramanian and Harold W. Carter and Andrey Bogdanov and Andy Rupp and Jintai Ding}, title = {Fast multivariate signature generation in hardware: The case of rainbow}, booktitle = {19th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven, Belgium}, pages = {25--30}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ASAP.2008.4580149}, doi = {10.1109/ASAP.2008.4580149}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/BalasubramanianCBRD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bliss/HoqueFH08, author = {Sanaul Hoque and Michael C. Fairhurst and W. Gareth J. Howells}, editor = {Adrian Stoica and Tughrul Arslan and Daniel Howard and Tetsuya Higuchi and Ahmed O. El{-}Rayis}, title = {Evaluating Biometric Encryption Key Generation Using Handwritten Signatures}, booktitle = {2008 {ECSIS} Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, {BLISS} 2008, Edinburgh, UK, 4-6 August 2008}, pages = {17--22}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/BLISS.2008.8}, doi = {10.1109/BLISS.2008.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bliss/HoqueFH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadcom/MohammedC08, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan}, editor = {Johnson I. Agbinya and Elmarie Biermann and Yskandar Hamam and Ntsibane Ntlatlapa and Keith Ferguson}, title = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet}, booktitle = {2008 Third International Conference on Broadband Communications, Information Technology {\&} Biomedical Applications, BroadCom 2008, 23-26 November 2008, Pretoria, Gauteng, South Africa}, pages = {142--147}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/BROADCOM.2008.21}, doi = {10.1109/BROADCOM.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/broadcom/MohammedC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08, author = {Urko Zurutuza and Roberto Uribeetxeberria and Diego Zamboni}, editor = {Dirk Balfanz and Jessica Staddon}, title = {A data mining approach for analysis of worm activity through automatic signature generation}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {61--70}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456394}, doi = {10.1145/1456377.1456394}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZurutuzaUZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/LiXYW08, author = {Nan Li and Chunhe Xia and Yi Yang and Haiquan Wang}, title = {An Algorithm for Generation of Attack Signatures Based on Sequences Alignment}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {964--969}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.555}, doi = {10.1109/CSSE.2008.555}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/LiXYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/delta/DoulcierFR08, author = {M. Doulcier and Marie{-}Lise Flottes and Bruno Rouzeyre}, title = {AES-Based {BIST:} Self-Test, Test Pattern Generation and Signature Analysis}, booktitle = {4th {IEEE} International Symposium on Electronic Design, Test and Applications, {DELTA} 2008, Hong Kong, January 23-25, 2008}, pages = {314--321}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/DELTA.2008.86}, doi = {10.1109/DELTA.2008.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/delta/DoulcierFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiWLR08, author = {Zhuowei Li and XiaoFeng Wang and Zhenkai Liang and Michael K. Reiter}, title = {{AGIS:} Towards automatic generation of infection signatures}, booktitle = {The 38th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings}, pages = {237--246}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/DSN.2008.4630092}, doi = {10.1109/DSN.2008.4630092}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiWLR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fccm/BalasubramanianBRDC08, author = {Sundar Balasubramanian and Andrey Bogdanov and Andy Rupp and Jintai Ding and Harold W. Carter}, editor = {Kenneth L. Pocek and Duncan A. Buell}, title = {Fast Multivariate Signature Generation in Hardware: The Case of Rainbow}, booktitle = {16th {IEEE} International Symposium on Field-Programmable Custom Computing Machines, {FCCM} 2008, 14-15 April 2008, Stanford, Palo Alto, California, {USA}}, pages = {281--282}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FCCM.2008.52}, doi = {10.1109/FCCM.2008.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fccm/BalasubramanianBRDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/YaoLGZY08, author = {Yu Yao and Junwei Lv and Fuxiang Gao and Yanfang Zhang and Ge Yu}, title = {Behavior-Based Worm Detection and Signature Generation}, booktitle = {International Multisymposiums on Computer and Computational Sciences, {IMSCCS} 2008, Shanghai, China, October 18-20, 2008}, pages = {124--131}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IMSCCS.2008.29}, doi = {10.1109/IMSCCS.2008.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/YaoLGZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VenkataramanBS08, author = {Shobha Venkataraman and Avrim Blum and Dawn Song}, title = {Limits of Learning-based Signature Generation with Adversaries}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/limits-of-learning-based-signature-generation-with-adversaries/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VenkataramanBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/ParkWKH08, author = {Byung{-}Chul Park and Young J. Won and Myung{-}Sup Kim and James W. Hong}, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {Towards automated application signature generation for traffic identification}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, pages = {160--167}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NOMS.2008.4575130}, doi = {10.1109/NOMS.2008.4575130}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/ParkWKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/XiaoHCL08, author = {Fengtao Xiao and Huaping Hu and Xin Chen and Bo Liu}, title = {{ASG} Automated Signature Generation for Worm-Like {P2P} Traffic Patterns}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {654--660}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAIM.2008.95}, doi = {10.1109/WAIM.2008.95}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/XiaoHCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiHPP07, author = {Min Cai and Kai Hwang and Jianping Pan and Christos Papadopoulos}, title = {WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {2}, pages = {88--104}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.1000}, doi = {10.1109/TDSC.2007.1000}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaiHPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HwangCCQ07, author = {Kai Hwang and Min Cai and Ying Chen and Min Qin}, title = {Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {1}, pages = {41--55}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.9}, doi = {10.1109/TDSC.2007.9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HwangCCQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GundyCSV07, author = {Matthew Van Gundy and Hao Chen and Zhendong Su and Giovanni Vigna}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {74--85}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.42}, doi = {10.1109/ACSAC.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/faw/JoSL07, author = {Je{-}Gyeong Jo and Jong{-}Won Seo and Hyung{-}Woo Lee}, editor = {Franco P. Preparata and Qizhi Fang}, title = {Biometric Digital Signature Key Generation and Cryptography Communication Based on Fingerprint}, booktitle = {Frontiers in Algorithmics, First Annual International Workshop, {FAW} 2007, Lanzhou, China, August 1-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4613}, pages = {38--49}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73814-5\_4}, doi = {10.1007/978-3-540-73814-5\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/faw/JoSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiWCF07, author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi Fu}, title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {164--173}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375847}, doi = {10.1109/ICNP.2007.4375847}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LiWCF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/TanakaSEY07, author = {Hideaki Tanaka and Shoichi Sasaki and Isao Echizen and Hiroshi Yoshiura}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {Secure Generation of Digital Signature on Compromised Computer}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {12--15}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.276}, doi = {10.1109/IIH-MSP.2007.276}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/TanakaSEY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kesamsta/KimLK07a, author = {Sijung Kim and Geuk Lee and Bonghan Kim}, editor = {Ngoc Thanh Nguyen and Adam Grzech and Robert J. Howlett and Lakhmi C. Jain}, title = {The Design and Testing of Automated Signature Generation Engine for Worms Detection}, booktitle = {Agent and Multi-Agent Systems: Technologies and Applications, First {KES} International Symposium, {KES-AMSTA} 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4496}, pages = {956--963}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72830-6\_101}, doi = {10.1007/978-3-540-72830-6\_101}, timestamp = {Thu, 16 Mar 2023 20:00:31 +0100}, biburl = {https://dblp.org/rec/conf/kesamsta/KimLK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/Nait-Sidi-MohWRG07, author = {Ahmed Nait{-}Sidi{-}Moh and Maxime Wack and Damien Rieupet and Jaafar Gaber}, editor = {Colette Rolland and Oscar Pastor and Jean{-}Louis Cavarero}, title = {On an innovative generation method of electronic signatures: comparative study with traditional hash functions simulation}, booktitle = {Proceedings of the First International Conference on Research Challenges in Information Science, {RCIS} 2007, Ouarzazate, Morocco, April 23-26, 2007}, pages = {357--360}, year = {2007}, timestamp = {Mon, 18 Jan 2021 08:56:35 +0100}, biburl = {https://dblp.org/rec/conf/rcis/Nait-Sidi-MohWRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJG06, author = {Hao Wang and Somesh Jha and Vinod Ganapathy}, title = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {99--108}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.34}, doi = {10.1109/ACSAC.2006.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangLXRKC06, author = {XiaoFeng Wang and Zhuowei Li and Jun Xu and Michael K. Reiter and Chongkyung Kil and Jong Youl Choi}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Packet vaccine: black-box exploit detection and signature generation}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {37--46}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180412}, doi = {10.1145/1180405.1180412}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangLXRKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosys/PortokalidisSB06, author = {Georgios Portokalidis and Asia Slowinska and Herbert Bos}, editor = {Yolande Berbers and Willy Zwaenepoel}, title = {Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation}, booktitle = {Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006}, pages = {15--27}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1217935.1217938}, doi = {10.1145/1217935.1217938}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosys/PortokalidisSB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/YipGNT06, author = {Wai Kuan Yip and Alwyn Goh and David Ngo Chek Ling and Andrew Teoh Beng Jin}, editor = {David Zhang and Anil K. Jain}, title = {Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2006, Hong Kong, China, January 5-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3832}, pages = {509--515}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11608288\_68}, doi = {10.1007/11608288\_68}, timestamp = {Thu, 17 Oct 2019 12:39:20 +0200}, biburl = {https://dblp.org/rec/conf/icb/YipGNT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mrcs/WahlHHI06, author = {Alain Wahl and Jean Hennebert and Andreas Humm and Rolf Ingold}, editor = {Bilge G{\"{u}}nsel and Anil K. Jain and A. Murat Tekalp and B{\"{u}}lent Sankur}, title = {Generation and Evaluation of Brute-Force Signature Forgeries}, booktitle = {Multimedia Content Representation, Classification and Security, International Workshop, {MRCS} 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4105}, pages = {2--9}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11848035\_2}, doi = {10.1007/11848035\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mrcs/WahlHHI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChungM06, author = {Simon P. Chung and Aloysius K. Mok}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Allergy Attack Against Automatic Signature Generation}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {61--80}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_4}, doi = {10.1007/11856214\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChungM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06, author = {David Brumley and James Newsome and Dawn Xiaodong Song and Hao Wang and Somesh Jha}, title = {Towards Automatic Generation of Vulnerability-Based Signatures}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {2--16}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.41}, doi = {10.1109/SP.2006.41}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiSCKC06, author = {Zhichun Li and Manan Sanghi and Yan Chen and Ming{-}Yang Kao and Brian Chavez}, title = {Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {32--47}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.18}, doi = {10.1109/SP.2006.18}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiSCKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiangS05, author = {Zhenkai Liang and R. Sekar}, title = {Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.12}, doi = {10.1109/CSAC.2005.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiangS05, author = {Zhenkai Liang and R. Sekar}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Fast and automated generation of attack signatures: a basis for building self-protecting servers}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {213--222}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102150}, doi = {10.1145/1102120.1102150}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/DyerN05, author = {Justin S. Dyer and Balasubramaniam Natarajan}, title = {A new deterministic algorithm for {DS-CDMA} signature sequence generation}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2005, Seoul, Korea, 16-20 May 2005}, pages = {2348--2351}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICC.2005.1494755}, doi = {10.1109/ICC.2005.1494755}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/DyerN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/SimkhadaTWN05, author = {Kumar Simkhada and Hiroshi Tsunoda and Yuji Waizumi and Yoshiaki Nemoto}, title = {Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures}, booktitle = {Seventh {IEEE} International Symposium on Multimedia {(ISM} 2005), 12-14 December 2005, Irvine, CA, {USA}}, pages = {680--685}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISM.2005.49}, doi = {10.1109/ISM.2005.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ism/SimkhadaTWN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangCS05, author = {Ke Wang and Gabriela F. Cretu and Salvatore J. Stolfo}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Anomalous Payload-Based Worm Detection and Signature Generation}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {227--246}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_12}, doi = {10.1007/11663812\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TangCR05, author = {Caimu Tang and Anthony T. Chronopoulos and Cauligi S. Raghavendra}, title = {Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {353--364}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.52}, doi = {10.1109/SECURECOMM.2005.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/TangCR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RubinJM05, author = {Shai Rubin and Somesh Jha and Barton P. Miller}, title = {Language-Based Generation and Evaluation of {NIDS} Signatures}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.10}, doi = {10.1109/SP.2005.10}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/RubinJM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/GuptaTM04, author = {Alok Gupta and Y. Alex Tung and James R. Marsden}, title = {Digital signature: use and modification to achieve success in next generational e-business processes}, journal = {Inf. Manag.}, volume = {41}, number = {5}, pages = {561--575}, year = {2004}, url = {https://doi.org/10.1016/S0378-7206(03)00090-9}, doi = {10.1016/S0378-7206(03)00090-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/GuptaTM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SameshimaSOM04, author = {Yoshiki Sameshima and Hideaki Saisho and Kazuko Oyanagi and Tsutomu Matsumoto}, title = {Multiparty {DSA} Signature Generation without Simultaneous User Operations}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {87-D}, number = {8}, pages = {2095--2105}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-d\_8\_2095}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SameshimaSOM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MacKenzieR04, author = {Philip D. MacKenzie and Michael K. Reiter}, title = {Two-party generation of {DSA} signatures}, journal = {Int. J. Inf. Sec.}, volume = {2}, number = {3-4}, pages = {218--239}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0041-0}, doi = {10.1007/S10207-004-0041-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MacKenzieR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KwonL04, author = {Taekyoung Kwon and Jaeil Lee}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Practical Digital Signature Generation Using Biometrics}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {728--737}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_85}, doi = {10.1007/978-3-540-24707-4\_85}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KwonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0409014, author = {Manoj Kumar}, title = {A Digital Signature with Threshold Generation and Verification}, journal = {CoRR}, volume = {cs.CR/0409014}, year = {2004}, url = {http://arxiv.org/abs/cs.CR/0409014}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0409014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/SadowskiP03, author = {Michael I. Sadowski and John Howard Parish}, title = {Automated generation and refinement of protein signatures: case study with G-protein coupled receptors}, journal = {Bioinform.}, volume = {19}, number = {6}, pages = {727--734}, year = {2003}, url = {https://doi.org/10.1093/bioinformatics/btg075}, doi = {10.1093/BIOINFORMATICS/BTG075}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/SadowskiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/YoussefA03, author = {Bilal Youssef and Mazen Alamir}, title = {Generic signature generation tool for diagnosis and parametric estimation of multi-variable dynamical nonlinear systems}, booktitle = {42nd {IEEE} Conference on Decision and Control, {CDC} 2003, Maui, Hawaii, USA, December 9-12, 2003}, pages = {966--971}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CDC.2003.1272692}, doi = {10.1109/CDC.2003.1272692}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/YoussefA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/FengW02, author = {Feng Hao and Chan Choong Wah}, title = {Private key generation from on-line handwritten signatures}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {4}, pages = {159--164}, year = {2002}, url = {https://doi.org/10.1108/09685220210436949}, doi = {10.1108/09685220210436949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/FengW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MacKenzieR01, author = {Philip D. MacKenzie and Michael K. Reiter}, editor = {Joe Kilian}, title = {Two-Party Generation of {DSA} Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {137--154}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_8}, doi = {10.1007/3-540-44647-8\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MacKenzieR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Huhnlein01, author = {Detlef H{\"{u}}hnlein}, editor = {David Naccache}, title = {Faster Generation of NICE-Schnorr-Type Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {1--12}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_1}, doi = {10.1007/3-540-45353-9\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Huhnlein01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Ramesh01, author = {D. Ramesh}, editor = {C. Pandu Rangan and Cunsheng Ding}, title = {A Twin Algorithm for Efficient Generation of Digital Signatures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2247}, pages = {267--274}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45311-3\_25}, doi = {10.1007/3-540-45311-3\_25}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Ramesh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwvf/Nishida01, author = {Hirobumi Nishida}, editor = {Carlo Arcelli and Luigi P. Cordella and Gabriella Sanniti di Baja}, title = {Robust Structural Indexing through Quasi-Invariant Shape Signatures and Feature Generation}, booktitle = {Visual Form 2001, 4th International Workshop on Visual Form, IWVF-4, Capri, Italy, May 28-30, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2059}, pages = {696--705}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45129-3\_64}, doi = {10.1007/3-540-45129-3\_64}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iwvf/Nishida01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JakobssonW01, author = {Markus Jakobsson and Susanne Wetzel}, editor = {Kwangjo Kim}, title = {Secure Server-Aided Signature Generation}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {383--401}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_28}, doi = {10.1007/3-540-44586-2\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JakobssonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ats/ShiehLS00, author = {Ming{-}Der Shieh and Hsin{-}Fu Lo and Ming{-}Hwa Sheu}, title = {High-speed generation of {LFSR} signatures}, booktitle = {9th Asian Test Symposium {(ATS} 2000), 4-6 December 2000, Taipei, Taiwan}, pages = {222}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ATS.2000.893629}, doi = {10.1109/ATS.2000.893629}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ats/ShiehLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/YarmanA00, author = {B. Siddik Yarman and Rafet Akdeniz}, title = {Generation of optimum signature base sequences for speech signals}, booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing. {ICASSP} 2000, 5-9 June, 2000, Hilton Hotel and Convention Center, Istanbul, Turkey}, pages = {1077--1080}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICASSP.2000.859150}, doi = {10.1109/ICASSP.2000.859150}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/YarmanA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edcc/Echtle99, author = {Klaus Echtle}, editor = {Jan Hlavicka and Erik Maehle and Andr{\'{a}}s Pataricza}, title = {Avoiding Malicious Byzantine Faults by a New Signature Generation Technique}, booktitle = {Dependable Computing - EDCC-3, Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1667}, pages = {106--123}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48254-7\_9}, doi = {10.1007/3-540-48254-7\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/edcc/Echtle99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/ChakrabartiDAR98, author = {Soumen Chakrabarti and Byron Dom and Rakesh Agrawal and Prabhakar Raghavan}, title = {Scalable Feature Selection, Classification and Signature Generation for Organizing Large Text Databases into Hierarchical Topic Taxonomies}, journal = {{VLDB} J.}, volume = {7}, number = {3}, pages = {163--178}, year = {1998}, url = {https://doi.org/10.1007/s007780050061}, doi = {10.1007/S007780050061}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vldb/ChakrabartiDAR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PoupardS98, author = {Guillaume Poupard and Jacques Stern}, editor = {Kaisa Nyberg}, title = {Security Analysis of a Practical "on the fly" Authentication and Signature Generation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {422--436}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054143}, doi = {10.1007/BFB0054143}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PoupardS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/KinoshitaS98, author = {Hirotsugu Kinoshita and Masafumi Satoh}, title = {Generation of the signature with the structured information of the image}, booktitle = {9th European Signal Processing Conference, {EUSIPCO} 1998, Island of Rhodes, Greece, 8-11 September, 1998}, pages = {1--4}, publisher = {{IEEE}}, year = {1998}, url = {https://ieeexplore.ieee.org/document/7089552/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/KinoshitaS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsdia/OliveiraKBS97, author = {Claudio de Oliveira and Celso A. A. Kaestner and Fl{\'{a}}vio Bortolozzi and Robert Sabourin}, editor = {Nabeel A. Murshed and Fl{\'{a}}vio Bortolozzi}, title = {Generation of Signatures by Deformations}, booktitle = {Advances in Document Image Analysis, First Brazilian Symposium, BSDIA'97, Curitiba, Brazil, November 2-5, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1339}, pages = {283--298}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63791-5\_22}, doi = {10.1007/3-540-63791-5\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/bsdia/OliveiraKBS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spieSR/CelentanoL97, author = {Augusto Celentano and Vincenzo Di Lecce}, editor = {Ishwar K. Sethi and Ramesh C. Jain}, title = {FFT-Based Technique for Image-Signature Generation}, booktitle = {Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, February 8-14, 1997}, series = {{SPIE} Proceedings}, volume = {3022}, pages = {457--466}, publisher = {{SPIE}}, year = {1997}, url = {https://doi.org/10.1117/12.263435}, doi = {10.1117/12.263435}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spieSR/CelentanoL97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MRaihiN96, author = {David M'Ra{\"{\i}}hi and David Naccache}, editor = {Li Gong and Jacques Stearn}, title = {Batch Exponentiation: {A} Fast DLP-Based Signature Generation Strategy}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {58--61}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238187}, doi = {10.1145/238168.238187}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MRaihiN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramesD96, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Neal Koblitz}, title = {New Generation of Secure and Practical RSA-Based Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {173--185}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_14}, doi = {10.1007/3-540-68697-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramesD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acm/YoungL94, author = {Hwan{-}Seung Yong and Sukho Lee}, editor = {John Werth and Laurie Honour Werth}, title = {Signature File Generation Techniques for Query Processing in Object-Oriented Databases}, booktitle = {Proceedings of the {ACM} 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, {CSC} '94, Phoenix, Arizona, USA, March 8-10, 1994}, pages = {364--371}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/197530.197653}, doi = {10.1145/197530.197653}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acm/YoungL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/LengL92, author = {Chun{-}Wu Roger Leng and Dik Lun Lee}, title = {Optimal Weight Assignment for Signature Generation}, journal = {{ACM} Trans. Database Syst.}, volume = {17}, number = {2}, pages = {346--373}, year = {1992}, url = {https://doi.org/10.1145/128903.128907}, doi = {10.1145/128903.128907}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/LengL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Schnorr91, author = {Claus{-}Peter Schnorr}, title = {Efficient Signature Generation by Smart Cards}, journal = {J. Cryptol.}, volume = {4}, number = {3}, pages = {161--174}, year = {1991}, url = {https://doi.org/10.1007/BF00196725}, doi = {10.1007/BF00196725}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Schnorr91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DesmedtF91, author = {Yvo Desmedt and Yair Frankel}, editor = {Joan Feigenbaum}, title = {Shared Generation of Authenticators and Signatures (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {457--469}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_37}, doi = {10.1007/3-540-46766-1\_37}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DesmedtF91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OngS90, author = {H. Ong and Claus{-}Peter Schnorr}, editor = {Ivan Damg{\aa}rd}, title = {Fast Signature Generation With a Fiat Shamir-Like Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {432--440}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_38}, doi = {10.1007/3-540-46877-3\_38}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OngS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.