short signatures
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 4)

H-INDEX

12
(FIVE YEARS 1)

Author(s):  
Mohamed Amine Ferrag ◽  
Abdelaziz Amara korba

This chapter proposes a security framework for achieving secure and privacy-preserving mobile social networks named ASPP. Based on the cooperative neighbor, reactive routing protocol, and short signatures technique, the proposed scheme can not only detect and avoid but also can preserve the message privacy against elemental attacks and compound attacks. In addition, ASPP is robust against eavesdropping attack, wormhole attack, packet analysis attack, packet tracing attack, and replay attack. Extensive analyses and experiments are given to demonstrate its high detection rate and practicability under various scenarios.


Author(s):  
N. Syrotenko ◽  
R. Tamoshiunaite ◽  
V. Abrosymova

This article is devoted to the topical problem of forensic handwriting analysis: research on short simple signatures and on solution of identification and diagnostic problems regarding such objects. On the basis of examples from forensic expert practice in Hon. Prof. M. S. Bokarius Kharkiv Research Institute of Forensic Examinations, the possibility of solving forensic handwriting problems while the study of short and simple signatures is illustrated. It is noted that current methodical state of forensic science institutes of the Ministry of Justice of Ukraine allows to conduct forensic handwriting analysis as well as forensic handwriting research on these objects using traditional methods. While solving such issues, the general method of scientific cognition: dialectical materialism; Empirical research method; the method of analysis and synthesis; observation, experimentation and modelling methods; instrumental method, measuring method; qualitatively descriptive method have been used. Research proved possibility of identification and diagnostic forensic handwriting tasks solution while the study of short simple signatures provided that forensic experts have a sufficient amount of informative comparative material. The present subjective approach in defining “suitability” of low- informative objects for solution of identification and diagnostic issues is stressed in the article. Success while solving the indicated forensic handwriting tasks depends on the professional level of forensic expert.


Computers ◽  
2019 ◽  
Vol 8 (3) ◽  
pp. 58 ◽  
Author(s):  
Mohamed Amine Ferrag ◽  
Leandros Maglaras

In this paper, we propose an intrusion detection system (IDS) and Blockchain-based delivery framework, called DeliveryCoin, for drone-delivered services. The DeliveryCoin framework consists of four phases, including system initialization phase, creating the block, updating the blockchain, and intrusion detection phase. To achieve privacy-preservation, the DeliveryCoin framework employs hash functions and short signatures without random oracles and the Strong Diffie–Hellman (SDH) assumption in bilinear groups. To achieve consensus inside the blockchain-based delivery platform, we introduce a UAV-aided forwarding mechanism, named pBFTF. We also propose an IDS system in each macro eNB (5G) for detecting self-driving network attacks as well as false transactions between self-driving nodes. Furthermore, extensive simulations are conducted, and results confirm the efficiency of our proposed DeliveryCoin framework in terms of latency of blockchain consensus and accuracy.


Author(s):  
Mohamed Amine Ferrag ◽  
Abdelaziz Amara korba

This chapter proposes a security framework for achieving secure and privacy-preserving mobile social networks named ASPP. Based on the cooperative neighbor, reactive routing protocol, and short signatures technique, the proposed scheme can not only detect and avoid but also can preserve the message privacy against elemental attacks and compound attacks. In addition, ASPP is robust against eavesdropping attack, wormhole attack, packet analysis attack, packet tracing attack, and replay attack. Extensive analyses and experiments are given to demonstrate its high detection rate and practicability under various scenarios.


2017 ◽  
Vol 45 ◽  
pp. 53-61
Author(s):  
Nijolė Jonaitienė

It is difficult to imitate another persons signature. Handwritten signature is unique. There are no special rules for person‘s signature. The signature can be any. It only should meet the requiments: consist of letters not only loop, line, curve and etc. elements.  Un­fortunately, in our hurried age signatures become shorter and simpler. During that time people lost emotional connection to their signature. Many of the signatures of the high officials, who usually sign very important documents, are also very simple and sometimes seem more like graphical pictures than signatures. We receive many short and too simple signatures recently. It is a real headache for Lithuanian handwriting experts. Modern handwriting examinations are powerless to solve this problem. It is our duty to inform people about the dangers of short signatures and to educate people to sign accordance with a person’s surname. This would contribute to the signing culture growth, and as a result would let us answer and help in more cases.


2013 ◽  
Vol 7 (3) ◽  
pp. 253-263 ◽  
Author(s):  
Yu-Chi Chen ◽  
Chao-Liang Liu ◽  
Gwoboa Horng
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document