Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
5
views
30
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
909
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Social, Cultural, and Behavioral Modeling : 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18–21, 2020, Proceedings
Fast Authentication from Aggregate Signatures with Improved Security
other
Author(s):
Muslum Ozgur Ozmen
,
Rouzbeh Behnia
,
Attila A. Yavuz
Publication date
(Online):
September 30 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
30
Record
: found
Abstract
: not found
Article
: not found
A method for obtaining digital signatures and public-key cryptosystems
R. L. Rivest
,
A Shamir
,
L Adleman
(1978)
0
comments
Cited
387
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Smart Grid Technologies: Communication Technologies and Standards
Vehbi Gungor
,
Dilan Sahin
,
Taskin Kocak
…
(2011)
0
comments
Cited
260
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
Dan Boneh
,
Craig Gentry
,
Ben Lynn
…
(2003)
0
comments
Cited
122
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
September 30 2019
Pages
: 686-705
DOI:
10.1007/978-3-030-32101-7_39
SO-VID:
bc4c7015-d2b1-446c-a5f8-93a218ff5900
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Beyond Words: Comparing Structure, Emoji Use, and Consistency Across Social Media Posts
pp. 3
Preferences and Patterns of Paralinguistic Voice Input to Interactive Media
pp. 3
Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies
pp. 12
Bot Impacts on Public Sentiment and Community Structures: Comparative Analysis of Three Elections in the Asia-Pacific
pp. 13
"Show and Tell": Using Semantically Processable Prosodic Markers for Spatial Expressions in an HCI System for Consumer Complaints
pp. 23
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
pp. 23
Understanding Colonial Legacy and Environmental Issues in Senegal Through Language Use
pp. 23
Exploiting Speech-Gesture Correlation in Multimodal Interaction
pp. 31
Pictogram Retrieval Based on Collective Semantics
pp. 35
Deploying System Dynamics Models for Disease Surveillance in the Philippines
pp. 40
Enrich Web Applications with Voice Internet Persona Text-to-Speech for Anyone, Anywhere
pp. 42
Compounding of Wealth in Proof-of-Stake Cryptocurrencies
pp. 45
MDR Cluster-Debias: A Nonlinear Word Embedding Debiasing Pipeline
pp. 50
Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language
pp. 55
Modeling Interventions for Insider Threat
pp. 60
Subjective Measurement of Workload Related to a Multimodal Interaction Task: NASA-TLX vs. Workload Profile
pp. 62
Short Paper: I Can’t Believe It’s Not Stake! Resource Exhaustion Attacks on PoS
pp. 65
Validating Social Media Monitoring: Statistical Pitfalls and Opportunities from Public Opinion
pp. 70
Menu Selection Using Auditory Interface
pp. 73
Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape
pp. 75
Lying About Lying on Social Media: A Case Study of the 2019 Canadian Elections
pp. 76
Analysis of User Interaction with Service Oriented Chatbot Systems
pp. 84
Performance Analysis of Perceptual Speech Quality and Modules Design for Management over IP Network
pp. 84
Short Paper: An Empirical Analysis of Blockchain Forks in Bitcoin
pp. 86
Breadth Verses Depth: The Impact of Tree Structure on Cultural Influence
pp. 93
Detecting Token Systems on Ethereum
pp. 94
A Tangible User Interface with Multimodal Feedback
pp. 96
Optimizing Attention-Aware Opinion Seeding Strategies
pp. 104
Minimal Parsing Key Concept Based Question Answering System
pp. 107
Polarizing Tweets on Climate Change
pp. 113
Measuring Ethereum-Based ERC20 Token Networks
pp. 114
Customized Message Generation and Speech Synthesis in Response to Characteristic Behavioral Patterns of Children
pp. 118
Characterizing Sociolinguistic Variation in the Competing Vaccination Communities
pp. 124
Multi-word Expression Recognition Integrated with Two-Level Finite State Transducer
pp. 130
On Countering Disinformation with Caution: Effective Inoculation Strategies and Others that Backfire into Community Hyper-Polarization
pp. 133
New Empirical Traceability Analysis of CryptoNote-Style Blockchains
pp. 134
Towards Multimodal User Interfaces Composition Based on UsiXML and MBD Principles
pp. 140
Homicidal Event Forecasting and Interpretable Analysis Using Hierarchical Attention Model
pp. 144
m-LoCoS UI: A Universal Visible Language for Global Mobile Communication
pp. 150
Short Paper: An Empirical Analysis of Monero Cross-chain Traceability
pp. 151
Development of a Hybrid Machine Learning Agent Based Model for Optimization and Interpretability
pp. 154
Developing a Conversational Agent Using Ontologies
pp. 158
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
pp. 161
Canadian Federal Election and Hashtags that Do Not Belong
pp. 165
Conspeakuous: Contextualising Conversational Systems
pp. 171
Group Formation Theory at Multiple Scales
pp. 176
Persuasive Effects of Embodied Conversational Agent Teams
pp. 179
ZLiTE: Lightweight Clients for Shielded Zcash Transactions Using Trusted Execution
pp. 182
Towards Agent Validation of a Military Cyber Team Performance Simulation
pp. 186
Exploration of Possibility of Multithreaded Conversations Using a Voice Communication System
pp. 192
Developing Graph Theoretic Techniques to Identify Amplification and Coordination Activities of Influential Sets of Users
pp. 196
A Toolkit for Multimodal Interface Design: An Empirical Investigation
pp. 201
Designed to Be Broken: A Reverse Engineering Study of the 3D Secure 2.0 Payment Protocol
pp. 202
Detecting Online Hate Speech: Approaches Using Weak Supervision and Network Embedding Models
pp. 206
An Input-Parsing Algorithm Supporting Integration of Deictic Gesture in Natural Language Interface
pp. 213
Critical Spatial Clusters for Vaccine Preventable Diseases
pp. 216
Multimodal Interfaces for In-Vehicle Applications
pp. 222
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers
pp. 224
Multi-cause Discrimination Analysis Using Potential Outcomes
pp. 225
Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction
pp. 232
An Empirical Study on Users’ Acceptance of Speech Recognition Errors in Text-Messaging
pp. 234
Short Paper: How to Attack PSD2 Internet Banking
pp. 235
Twitter Is the Megaphone of Cross-platform Messaging on the White Helmets
pp. 243
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
pp. 243
Flexible Multi-modal Interaction Technologies and User Interface Specially Designed for Chinese Car Infotainment System
pp. 245
Learning Behavioral Representations from Wearable Sensors
pp. 253
A Spoken Dialogue System Based on Keyword Spotting Technology
pp. 255
The Rise and Fall of Humanitarian Citizen Initiatives: A Simulation-Based Approach
pp. 265
Secure Trick-Taking Game Protocols
pp. 265
Dynamic Association Rules Mining to Improve Intermediation Between User Multi-channel Interactions and Interactive e-Services
pp. 266
Developing an Epidemiological Model to Study Spread of Toxicity on YouTube
pp. 275
Emotionally Expressive Avatars for Chatting, Learning and Therapeutic Intervention
pp. 277
Predicting Student Flight Performance with Multimodal Features
pp. 282
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
pp. 288
A Game-Transformation-Based Framework to Understand Initial Conditions and Outcomes in the Context of Cyber-Enabled Influence Operations (CIOs)
pp. 298
Automatic Mobile Content Conversion Using Semantic Image Analysis
pp. 298
The Human Resource Management Parameter Experimentation Tool
pp. 301
Universally Verifiable MPC and IRV Ballot Counting
pp. 308
History Based User Interest Modeling in WWW Access
pp. 308
Utilizing Python for Agent-Based Modeling: The Mesa Framework
pp. 313
Development of a Generic Design Framework for Intelligent Adaptive Systems
pp. 318
Strategic Information Operation in YouTube: The Case of the White Helmets
pp. 320
Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected \(O(n^2)\) Communication, and Optimal Resilience
pp. 321
Three Way Relationship of Human-Robot Interaction
pp. 329
Artifacts of Crisis: Textual Analysis of Euromaidan
pp. 331
MEMORIA: Personal Memento Service Using Intelligent Gadgets
pp. 337
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data
pp. 340
Modeling Decisions from Experience Among Frequent and Infrequent Switchers via Strategy-Based and Instance-Based Models
pp. 340
A Location-Adaptive Human-Centered Audio Email Notification Service for Multi-user Environments
pp. 349
Emotion-Based Textile Indexing Using Neural Networks
pp. 357
Adaptively Secure Constrained Pseudorandom Functions
pp. 358
Decision Theoretic Perspective on Optimizing Intelligent Help
pp. 366
Human-Aided Cleaning Algorithm for Low-Cost Robot Architecture
pp. 376
The Perception of Artificial Intelligence as “Human” by Computer Users
pp. 377
LARA: A Design Concept for Lattice-Based Encryption
pp. 385
Speaker Segmentation for Intelligent Responsive Space
pp. 393
Emotion and Sense of Telepresence: The Effects of Screen Viewpoint, Self-transcendence Style, and NPC in a 3D Game Environment
pp. 396
Short Paper: The Proof is in the Pudding
pp. 401
Emotional Interaction Through Physical Movement
pp. 407
Minimizing Trust in Hardware Wallets with Two Factor Signatures
pp. 411
Towards Affective Sensing
pp. 421
Affective User Modeling for Adaptive Intelligent User Interfaces
pp. 426
A Formal Treatment of Hardware Wallets
pp. 431
A Multidimensional Classification Model for the Interaction in Reactive Media Rooms
pp. 440
An Adaptive Web Browsing Method for Various Terminals: A Semantic Over-Viewing Method
pp. 446
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
pp. 449
Evaluation of P2P Information Recommendation Based on Collaborative Filtering
pp. 459
Understanding the Social Relationship Between Humans and Virtual Humans
pp. 465
EREC-II in Use – Studies on Usability and Suitability of a Sensor System for Affect Detection and Human Performance Monitoring
pp. 466
Bitcoin Security Under Temporary Dishonest Majority
pp. 475
Development of an Adaptive Multi-agent Based Content Collection System for Digital Libraries
pp. 486
Using Content-Based Multimedia Data Retrieval for Multimedia Content Adaptation
pp. 487
VAPOR: A Value-Centric Blockchain that is Scale-out, Decentralized, and Flexible by Design
pp. 493
Coping with Complexity Through Adaptive Interface Design
pp. 499
Region-Based Model of Tour Planning Applied to Interactive Tour Generation
pp. 508
Sprites and State Channels: Payment Networks that Go Faster Than Lightning
pp. 508
A Learning Interface Agent for User Behavior Prediction
pp. 518
Sharing Video Browsing Style by Associating Browsing Behavior with Low-Level Features of Videos
pp. 527
Echoes of the Past: Recovering Blockchain Metrics from Merged Mining
pp. 527
Adaptation in Intelligent Tutoring Systems: Development of Tutoring and Domain Models
pp. 535
Confidence Measure Based Incremental Adaptation for Online Language Identification
pp. 544
Study on Speech Emotion Recognition System in E-Learning
pp. 550
TxProbe: Discovering Bitcoin’s Network Topology Using Orphan Transactions
pp. 555
How Do Adults Solve Digital Tangram Problems? Analyzing Cognitive Strategies Through Eye Tracking Approach
pp. 564
Gesture Interaction for Electronic Music Performance
pp. 569
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers
pp. 573
A New Method for Multi-finger Detection Using a Regular Diffuser
pp. 583
Lip Contour Extraction Using Level Set Curve Evolution with Shape Constraint
pp. 588
Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features
pp. 589
Visual Foraging of Highlighted Text: An Eye-Tracking Study
pp. 599
Effects of a Dual-Task Tracking on Eye Fixation Related Potentials (EFRP)
pp. 605
Secure Multiparty PageRank Algorithm for Collaborative Fraud Detection
pp. 605
Effect of Glance Duration on Perceived Complexity and Segmentation of User Interfaces
pp. 615
Movement-Based Interaction and Event Management in Virtual Environments with Optical Tracking Systems
pp. 625
Multiple People Gesture Recognition for Human-Robot Interaction
pp. 627
HEALED: HEaling & Attestation for Low-End Embedded Devices
pp. 634
Position and Pose Computation of a Moving Camera Using Geometric Edge Matching for Visual SLAM
pp. 642
“Shooting a Bird”: Game System Using Facial Feature for the Handicapped People
pp. 646
One-Time Programs Made Practical
pp. 649
Human Pose Estimation Using a Mixture of Gaussians Based Image Modeling
pp. 659
Human Motion Modeling Using Multivision
pp. 667
Statement Voting
pp. 669
Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter
pp. 679
Kalman Filtering in the Design of Eye-Gaze-Guided Computer Interfaces
pp. 686
Fast Authentication from Aggregate Signatures with Improved Security
pp. 690
Human Shape Tracking for Gait Recognition Using Active Contours with Mean Shift
pp. 700
Robust Gaze Tracking Method for Stereoscopic Virtual Reality Systems
pp. 710
EyeScreen: A Gesture Interface for Manipulating On-Screen Objects
pp. 718
GART: The Gesture and Activity Recognition Toolkit
pp. 738
Multiple People Labeling and Tracking Using Stereo for Human Computer Interaction
pp. 747
A Study of Human Vision Inspection for Mura
pp. 755
Tracing Users’ Behaviors in a Multimodal Instructional Material: An Eye-Tracking Study
pp. 763
A Study on Interactive Artwork as an Aesthetic Object Using Computer Vision System
pp. 769
Human-Computer Interaction System Based on Nose Tracking
pp. 789
Impact of Mental Rotation Strategy on Absolute Direction Judgments: Supplementing Conventional Measures with Eye Movement Data
pp. 801
Beyond Mobile TV: Understanding How Mobile Interactive Systems Enable Users to Become Digital Producers
pp. 811
Media Convergence, an Introduction
pp. 815
An Improved H.264 Error Concealment Algorithm with User Feedback Design
pp. 821
Classification of a Person Picture and Scenery Picture Using Structured Simplicity
pp. 829
Designing Personalized Media Center with Focus on Ethical Issues of Privacy and Security
pp. 836
Evaluation of VISTO: A New Vector Image Search TOol
pp. 846
G-Tunes – Physical Interaction Design of Playing Music
pp. 852
nan0sphere: Location-Driven Fiction for Groups of Users
pp. 862
How Panoramic Photography Changed Multimedia Presentations in Tourism
pp. 872
Frame Segmentation Used MLP-Based X-Y Recursive for Mobile Cartoon Content
pp. 882
Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis
pp. 892
A Usability Study on Personalized EPG (pEPG) UI of Digital TV
pp. 902
Recognizing Cultural Diversity in Digital Television User Interface Design
pp. 909
A Study on User Satisfaction Evaluation About the Recommendation Techniques of a Personalized EPG System on Digital TV
pp. 918
Usability of Hybridmedia Services – PC and Mobile Applications Compared
pp. 926
m-YouTube Mobile UI: Video Selection Based on Social Influence
pp. 933
Can Video Support City-Based Communities?
pp. 943
Watch, Press, and Catch – Impact of Divided Attention on Requirements of Audiovisual Quality
pp. 953
Media Service Mediation Supporting Resident’s Collaboration in ubiTV
pp. 963
Implementation of a New H.264 Video Watermarking Algorithm with Usability Test
pp. 971
Innovative TV: From an Old Standard to a New Concept of Interactive TV – An Italian Job
pp. 981
Evaluating the Effectiveness of Digital Storytelling with Panoramic Images to Facilitate Experience Sharing
pp. 990
User-Centered Design and Evaluation of a Concurrent Voice Communication and Media Sharing Application
pp. 1000
Customer-Dependent Storytelling Tool with Authoring and Viewing Functions
pp. 1010
Reliable Partner System Always Providing Users with Companionship Through Video Streaming
pp. 1019
Modeling of Places Based on Feature Distribution
pp. 1028
Knowledge Transfer in Semi-automatic Image Interpretation
Similar content
909
Evaluating the Usability and User Acceptance of Biometric Authentication in Different Applications.
Authors:
A.M. Abdulkareem
,
A. Gordon
A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis
Authors:
Sandeep Gupta
,
Bruno Crispo
Enhancing security and privacy in biometrics-based authentication systems
Authors:
R. Bolle
,
J. H. Connell
,
N. K. Ratha
See all similar