Academic literature on the topic 'Analyse de signature'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Analyse de signature.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Analyse de signature"

1

Ruiz-Martínez, Antonio, Daniel Sánchez-Martínez, María Martínez-Montesinos, and Antonio F. Gómez-Skarmeta. "A Survey of Electronic Signature Solutions in Mobile Devices." Journal of Theoretical and Applied Electronic Commerce Research 2, no. 3 (2007): 94–109. http://dx.doi.org/10.3390/jtaer2030024.

Full text
Abstract:
The development of electronic signature in mobile devices is an essential issue for the advance and expansion of the mobile electronic commerce since it provides security and trust in the system. E-signatures provide security for the transactions with authenticity and integrity characteristics that make non-repudiation of the transactions possible. In recent years, different technologies and infrastructures have been developed with the aim of implementing mobile signature processes. Some are based on the SIM card. Others work over the middleware of the mobile device and cryptographic providers. Finally, there are already some frameworks which are independent of specific mobile device technologies and make mobile signatures available to application providers. Therefore, there is a great range of possibilities. In this paper we review the different solutions to date to provide electronic signature in mobile devices (SMS signature, SATK, WIM, USAT-i, SATSA, Mobile signature service, etc). We will comment on the most important goals of each solution and analyse the advantages and disadvantages. From this analysis we will obtain a global view of the current and future tendencies of mobile signature and thus help to provide mobile signature solutions.
APA, Harvard, Vancouver, ISO, and other styles
2

Chatterjee, Sanjit, M. Prem Laxman Das, and R. Kabaleeshwaran. "Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis." Journal of Mathematical Cryptology 12, no. 3 (2018): 159–90. http://dx.doi.org/10.1515/jmc-2017-0042.

Full text
Abstract:
Abstract Composite order pairing setting has been used to achieve cryptographic functionalities beyond what is attainable in prime order groups. However, such pairings are known to be significantly slower than their prime order counterparts. Thus emerged a new line of research – developing frameworks to convert cryptosystems from composite to prime order pairing setting. In this work, we analyse the intricacies of efficient prime order instantiation of cryptosystems that can be converted using existing frameworks. To compare the relative efficacy of these frameworks we mainly focus on some representative schemes: the Boneh–Goh–Nissim (BGN) homomorphic encryption scheme, ring and group signatures as well as a blind signature scheme. Our concrete analyses lead to several interesting observations. We show that even after a considerable amount of research, the projecting framework implicit in the very first work of Groth–Sahai still remains the best choice for instantiating the BGN cryptosystem. Protocols like the ring signature and group signature which use both projecting and cancelling setting in composite order can be most efficiently instantiated in the Freeman prime-order projecting only setting. In contrast, while the Freeman projecting setting is sufficient for the security reduction of the blind signature scheme, the simultaneous projecting and cancelling setting does provide some efficiency advantage.
APA, Harvard, Vancouver, ISO, and other styles
3

Harmati, István Á., Ádám Bukovics, and László T. Kóczy. "Minkowski’s Inequality Based Sensitivity Analysis of Fuzzy Signatures." Journal of Artificial Intelligence and Soft Computing Research 6, no. 4 (2016): 219–29. http://dx.doi.org/10.1515/jaiscr-2016-0016.

Full text
Abstract:
Abstract Fuzzy signatures were introduced as special tools to describe and handle complex systems without their detailed mathematical models. The input parameters of these systems naturally have uncertainties, due to human activities or lack of precise data. These uncertainties influence the final conclusion or decision about the system. In this paper we discuss the sensitivity of the weigthed general mean aggregation operator to the uncertainty of the input values, then we analyse the sensitivity of fuzzy signatures equipped with these aggregation operators. Finally, we apply our results to a fuzzy signature used in civil enginnering.
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Lei. "Analysis and Attack of Two Ring Signature Schemes." Advanced Materials Research 468-471 (February 2012): 382–85. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.382.

Full text
Abstract:
A ring signature scheme enables a signer, in an ad-hoc manner, to sign a signature on behalf of a group of users including himself such that a verifier can be convinced that one of the identified users actually generated the signature but he can not identify the signer. In this paper, we analyse and attack two ring signature related schemes, including a ring signature scheme and a ring signcryption scheme, we prove that they can not satisfy the property of unconditional anonymity, and are all insecure.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhizhina, M. V. "Conducting Research on Handwriting Objects in Signature Sheets as Part of Election Campaigns: “Error Correction”." Actual Problems of Russian Law 15, no. 9 (2020): 104–12. http://dx.doi.org/10.17803/1994-1471.2020.118.9.104-112.

Full text
Abstract:
During the election campaign last summer, the author of this article was engaged by the management of the Central Election Commission of the Russian Federation to verify the correctness of activities associated with the expert study of voters’ signature sheets in support of the nomination of candidates for the Moscow City Duma. This participation was caused by numerous complaints of candidates for deputies who were refused registration because of insufficient number of reliable signatures of voters. Falsification of signature sheets was revealed by handwriting experts. Moreover, there has been a wave of rallies and demonstrations in support of unregistered candidates around the country, where doubts about the correctness of the expert checks and distrust to their results have been actively proclaimed. It was declared mainly by people doing little (if anything) with judicial graphology. In the paper we decided to address this problem in order to competently analyse the current situation, as well as to develop optimal ways to overcome possible negative consequences related to checking signature sheets by expert graphologists.
APA, Harvard, Vancouver, ISO, and other styles
6

Armignacco, R., T. Lartigue, A. Jouinot, et al. "Identification d’une signature moléculaire d’hypercortisolisme par analyse du methylome du sang total." Annales d'Endocrinologie 81, no. 4 (2020): 180. http://dx.doi.org/10.1016/j.ando.2020.07.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Omkar, Kunal Sawariya, and Polamarasetty Aparoy. "Graphlet signature-based scoring method to estimate protein–ligand binding affinity." Royal Society Open Science 1, no. 4 (2014): 140306. http://dx.doi.org/10.1098/rsos.140306.

Full text
Abstract:
Over the years, various computational methodologies have been developed to understand and quantify receptor–ligand interactions. Protein–ligand interactions can also be explained in the form of a network and its properties. The ligand binding at the protein-active site is stabilized by formation of new interactions like hydrogen bond, hydrophobic and ionic. These non-covalent interactions when considered as links cause non-isomorphic sub-graphs in the residue interaction network. This study aims to investigate the relationship between these induced sub-graphs and ligand activity. Graphlet signature-based analysis of networks has been applied in various biological problems; the focus of this work is to analyse protein–ligand interactions in terms of neighbourhood connectivity and to develop a method in which the information from residue interaction networks, i.e. graphlet signatures, can be applied to quantify ligand affinity. A scoring method was developed, which depicts the variability in signatures adopted by different amino acids during inhibitor binding, and was termed as GSUS (graphlet signature uniqueness score). The score is specific for every individual inhibitor. Two well-known drug targets, COX-2 and CA-II and their inhibitors, were considered to assess the method. Residue interaction networks of COX-2 and CA-II with their respective inhibitors were used. Only hydrogen bond network was considered to calculate GSUS and quantify protein–ligand interaction in terms of graphlet signatures. The correlation of the GSUS with pIC 50 was consistent in both proteins and better in comparison to the Autodock results. The GSUS scoring method was better in activity prediction of molecules with similar structure and diverse activity and vice versa. This study can be a major platform in developing approaches that can be used alone or together with existing methods to predict ligand affinity from protein–ligand complexes.
APA, Harvard, Vancouver, ISO, and other styles
8

Nash, Susan. "Signature Stories: Helen Timberlake‘s Petition to George III." Bulletin of the John Rylands Library 90, no. 2 (2014): 185–209. http://dx.doi.org/10.7227/bjrl.90.2.11.

Full text
Abstract:
This article explores the process of female self-fashioning in two previously neglected petitions dated 1786-87 by using signatures to analyse their texts and construct their contexts. In them, Helen Timberlake revises the account of frontier and Cherokee life her husband, Henry Timberlake, had published in his Memoirs (1765). Her intense maternal voice, focused on loss, entangles her history with that of the Cherokee chief Ostenaco, providing a grounded but often untrue narrative of shared family life and a persona tailored to evoke a history intertwined with that of George III. This article explores the mystery of Helen Timberlakes origins, while connecting the rhetoric of her petitions to the gendered emergence of sentimentalism, narratives of Indian captivity, and the historiography of ‘the Atlantic’.
APA, Harvard, Vancouver, ISO, and other styles
9

Migani, Guia. "La politica di cooperazione allo sviluppo della CEE: dall'associazione alla partnership (1957-1975)." MEMORIA E RICERCA, no. 30 (July 2009): 27–36. http://dx.doi.org/10.3280/mer2009-030003.

Full text
Abstract:
- This article analyses the EEC development policy between 1957, year of the signature of the Rome's Treaties, and 1975, signature of the Lomé Convention. In the first part, we examine the origins of the development policy, also called "Association policy" because the African colonies were associated to the EEC. In the second part, we analyse the two Yaoundé Conventions of Association (1963 and 1969) signed by the European and the African states. During this period the Six concentrated their discussions on the reform of the Convention after the independence of the African countries and the creation of UNCTAD. In the last part, the article focuses on the Seventies and on the Lomé Convention which renewed the instruments of the European Development policy and the relationship between the Nine and the Developing states. The negotiations of the three Conventions (Yaoundé I, Yaoundé II and Lomé) represent good opportunities to study the motivations and the role of the most important actors. Also, the evolution of the European development policy is analysed in relation with the changes of the international context.Parole chiave: Politica di associazione, Cooperazione allo sviluppo, Convenzione di Yaoundé, Convenzione di Lomé, Paesi ACP, Relazioni esterne della CEE EEC Association Policies, EEC Development Policies, Yaoundé Convention, Lomé Convention, ACP Countries, EEC External Relations
APA, Harvard, Vancouver, ISO, and other styles
10

Dhar, Sourish, and Sudipta Roy. "Mathematical document retrieval system based on signature hashing." APTIKOM Journal on Computer Science and Information Technologies 4, no. 1 (2020): 45–56. http://dx.doi.org/10.34306/csit.v4i1.87.

Full text
Abstract:
Scientific documents and magazines involve large number of mathematical expressions and formulas alongwith text. The continuous growth of such documents necessitates the requirement of developing specialized tools andtechniques, which could handle and analyse mathematical expressions and formulas. Mathematical expressions andformulae are highly structured and quite different from traditional text. Due to which conventional text retrievalsystem performs poorly in retrieving scientific documents based on mathematical expression formulated as a query.Mathematical information retrieval is concerned with finding information in documents that include mathematics. Toaddress the challenges posed by mathematical formulae as compared to text, this paper aims to construct a mathaware search engine, which can retrieve relevant scientific documents based on a mathematical query. A novelsignature based hashing scheme to index raw mathematical web documents is proposed in this paper, which can alsotake mathematical notational equivalences into account. The proposed system demonstrates better precision andstability of the ranked results when compared with other related state-of-the-art math aware search engines.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Analyse de signature"

1

Leveugle, Régis. "Analyse de signature et test en ligne intégré sur silicium." Grenoble INPG, 1990. http://www.theses.fr/1990INPG0014.

Full text
Abstract:
Cette these propose des methodes de conception pour introduire des capacites de test en ligne dans des circuits integres sur silicium. La methode de test en ligne utilisee consiste a verifier un flot de controle par detection des chemins illegaux. Cette methode est appliquee a plusieurs niveaux d'abstraction, a savoir la verification du bon deroulement d'un programme d'application sur un systeme a base de microprocesseur, et la verification du bon fonctionnement du sequenceur interne d'un circuit. Pour faciliter ces verifications, deux techniques sont utilisees: la compaction par division polynomiale des donnees a verifier (respectivement, les codes des instructions du programme et les codes des etats du sequenceur) et l'insertion de proprietes invariantes sur la signature ainsi obtenue (la signature des donnees a verifier est, en chaque point de l'organigramme de controle, independante des chemins prealablement parcourus). L'implantation sur silicium de circuits complets a demontre que ces techniques de test en ligne entrainent un tres faible accroissement de la surface (5 a 10% en moyenne) et pratiquement aucune degradation des performances. Ce resultat est du a la prise en compte de la testabilite en ligne a un stade precoce de la conception. Les etudes de cas concernent une famille de microprocesseurs (16 a 32 bits) et un ensemble de sequenceurs concus selon ces methodes
APA, Harvard, Vancouver, ISO, and other styles
2

Delord, Xavier. "Test en ligne par analyse de signature : application aux processeurs RISC." Grenoble INPG, 1993. http://www.theses.fr/1993INPG0026.

Full text
Abstract:
Cette these concerne le test en ligne de systemes a base de processeurs. Une nouvelle strategie de verification de flot de controle au niveau d'un programme d'application est proposee pour les processeurs risc. Comme la plupart des autres methodes, la technique presentee utilise une compaction d'information par division polynomiale. Les architectures risc sont etudiees afin de mettre en evidence les caracteristiques essentielles de l'execution pipelinee des instructions dans ces architectures. Un modele de pipeline, prenant en compte les branchements retardes et le deroulement des exceptions, est alors construit. La nouvelle strategie de test en ligne est deduite de ce modele. Cette technique est mise en uvre lors de la construction d'un moniteur destine au microprocesseur mc88100 de motorola. Cette application pratique montre le bien-fonde de la strategie proposee ainsi que son cout raisonnable. Cette these s'interesse aussi a la probabilite de masquage de l'analyse de signature utilisee dans le contexte du test en ligne de processeurs. Un simulateur de l'ensemble processeur, memoire et moniteur a ete construit; il permet d'injecter des erreurs suivant les principaux modeles courants. La conduite de nombreuses experimentations montre l'influence des structures de programme sur le masquage des erreurs dues a certains types de fautes. Ces probabilites de masquage ont des caracteristiques tres differentes de celles obtenues dans le cas ou la compaction est employee pour le test hors ligne pseudo-aleatoire de circuits. Contrairement a ce qui est communement admis dans la litterature, il n'est donc pas toujours correct de confondre ces deux utilisations de la division polynomiale vis-a-vis du calcul des probabilites de masquage d'erreur
APA, Harvard, Vancouver, ISO, and other styles
3

Houmani, Nesma. "Analyse de la qualité des signatures manuscrites en-ligne par la mesure d'entropie." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00765378.

Full text
Abstract:
Cette thèse s'inscrit dans le contexte de la vérification d'identité par la signature manuscrite en-ligne. Notre travail concerne plus particulièrement la recherche de nouvelles mesures qui permettent de quantifier la qualité des signatures en-ligne et d'établir des critères automatiques de fiabilité des systèmes de vérification. Nous avons proposé trois mesures de qualité faisant intervenir le concept d'entropie. Nous avons proposé une mesure de qualité au niveau de chaque personne, appelée "Entropie personnelle", calculée sur un ensemble de signatures authentiques d'une personne. L'originalité de l'approche réside dans le fait que l'entropie de la signature est calculée en estimant les densités de probabilité localement, sur des portions, par le biais d'un Modèle de Markov Caché. Nous montrons que notre mesure englobe les critères habituels utilisés dans la littérature pour quantifier la qualité d'une signature, à savoir: la complexité, la variabilité et la lisibilité. Aussi, cette mesure permet de générer, par classification non supervisée, des catégories de personnes, à la fois en termes de variabilité de la signature et de complexité du tracé. En confrontant cette mesure aux performances de systèmes de vérification usuels sur chaque catégorie de personnes, nous avons trouvé que les performances se dégradent de manière significative (d'un facteur 2 au minimum) entre les personnes de la catégorie "haute Entropie" (signatures très variables et peu complexes) et celles de la catégorie "basse Entropie" (signatures les plus stables et les plus complexes). Nous avons ensuite proposé une mesure de qualité basée sur l'entropie relative (distance de Kullback-Leibler), dénommée "Entropie Relative Personnelle" permettant de quantifier la vulnérabilité d'une personne aux attaques (bonnes imitations). Il s'agit là d'un concept original, très peu étudié dans la littérature. La vulnérabilité associée à chaque personne est calculée comme étant la distance de Kullback-Leibler entre les distributions de probabilité locales estimées sur les signatures authentiques de la personne et celles estimées sur les imitations qui lui sont associées. Nous utilisons pour cela deux Modèles de Markov Cachés, l'un est appris sur les signatures authentiques de la personne et l'autre sur les imitations associées à cette personne. Plus la distance de Kullback-Leibler est faible, plus la personne est considérée comme vulnérable aux attaques. Cette mesure est plus appropriée à l'analyse des systèmes biométriques car elle englobe en plus des trois critères habituels de la littérature, la vulnérabilité aux imitations. Enfin, nous avons proposé une mesure de qualité pour les signatures imitées, ce qui est totalement nouveau dans la littérature. Cette mesure de qualité est une extension de l'Entropie Personnelle adaptée au contexte des imitations: nous avons exploité l'information statistique de la personne cible pour mesurer combien la signature imitée réalisée par un imposteur va coller à la fonction de densité de probabilité associée à la personne cible. Nous avons ainsi défini la mesure de qualité des imitations comme étant la dissimilarité existant entre l'entropie associée à la personne à imiter et celle associée à l'imitation. Elle permet lors de l'évaluation des systèmes de vérification de quantifier la qualité des imitations, et ainsi d'apporter une information vis-à-vis de la résistance des systèmes aux attaques. Nous avons aussi montré l'intérêt de notre mesure d'Entropie Personnelle pour améliorer les performances des systèmes de vérification dans des applications réelles. Nous avons montré que la mesure d'Entropie peut être utilisée pour : améliorer la procédure d'enregistrement, quantifier la dégradation de la qualité des signatures due au changement de plateforme, sélectionner les meilleures signatures de référence, identifier les signatures aberrantes, et quantifier la pertinence de certains paramètres pour diminuer la variabilité temporelle.
APA, Harvard, Vancouver, ISO, and other styles
4

Qiu, Shulin. "Réseaux d'interconnexion tolérant les pannes et analyse de signature en compression de données /." Paris : École nationale supérieure des télécommunications, 1996. http://catalogue.bnf.fr/ark:/12148/cb35810126m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kacprzak, Philippe. "Etude et conception d'un système de surveillance pour mocroprocesseur by analyse de signature." Nancy 1, 1993. http://www.theses.fr/1993NAN10335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ekambi-Pokossi, Serge. "Identification et caractérisation multiéchelle de la signature peinture." Ecully, Ecole centrale de Lyon, 2005. http://bibli.ec-lyon.fr/exl-doc/sekambipokossi.pdf.

Full text
Abstract:
Ce travail s'intéresse à la caractérisation et l'identification topographique du processus de peinture des tôles galvanisées de carrosseries de voitures en relation avec l'aspect peint. Les surfaces de ces dernières présentent un caractère multiéchelle qui se traduit par l'existence de trois échelles de rugosité (bande de longueur d'onde), la "forme" correspondant aux grandes échelles, "l'ondulation" correspondant aux échelles intermédiaires et la "rugosité" qui représente les petites échelles. En particulier, l'ondulation créée à la fois pendant la phase de production des tôles et pendant leur mise en peinture influence fortement l'aspect après peinture. L'objectif de ce travail est d'analyser les différentes échelles de rugosité des tôles de manière localisée et d'établir des corrélations entre les différentes longueurs d'onde de l'état de surface et le degré d'aspect. Un deuxième objectif est de mettre au point de nouveaux critères d'échelle qui permettent de définir des surfaces modèles pour obtenir un meilleur aspect<br>This work is about the topographical identification and characterisation of galvanized autobodies steel sheets paint process, taking the paint appearance in account. Autobodies steel sheets surfaces are endowed with multiscale nature and three roughness scales families can be identified on them. Namely there exist the form, the waviness and the roughness representing respectively the high, the medium and the very small wavelengths of scales. We can emphasize on the waviness because it represents a very important family influencing much the paint appearance. This family is both created by the product and the paint processes of the steel sheets. The aim of this work is to make a local analysis of the different scales existing and to correlate with the paint appearance. The second objective is to create a new scale criterion in order to define some model surfaces giving the best paint appearance. To reach this objective it is necessary to find the paint signature. Finally this work is equivalent of seeking "ideal surface"
APA, Harvard, Vancouver, ISO, and other styles
7

Chapus, Charles. "Analyse de données phylogénétiques à l'aide de la signature génomique : aspects méthodologiques et application aux procaryotes." Paris 7, 2005. http://www.theses.fr/2005PA077012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Koussa, Eliane. "Analysis and design of post-quantum cryptographic algorithms : PKP-based signature scheme and ultra-short multivariate signatures." Electronic Thesis or Diss., université Paris-Saclay, 2020. http://www.theses.fr/2020UPASG027.

Full text
Abstract:
La construction d’un ordinateur quantique remettrait en cause la plupart des schémas à clef publique utilisés aujourd’hui. Par conséquent, il existe actuellement un effort de recherche important pour développer de nouveauxschémas cryptographiques post-quantique. En particulier, nous nous intéressons aux schémas post-quantiques dont la sécurité repose sur la dureté de la résolution de certains problèmes mathématiques tels que le problème PKP et leproblème HFE. Ce travail étudie d’abord la complexité de PKP. Et après une analyse approfondie des attaques connus sur PKP, nous avons pu mettre à jour certains résultats qui n’étaient pas précis, et fournir une formule de complexité explicite qui nous permet d’identifier les instances difficilesde ce problème et de donner des ensembles de paramètres sécurisés. PKP a été utilisé en 1989 pour développer le premier schéma d’identification à divulgation nulle de connaissance (ZK-IDS) qui a une implémentation efficace sur les cartes à puce. Dans un deuxième temps, nous optimisons le ZK-IDS basé sur PKP, puis nous introduisons PKP-DSS: un schéma de signature digitale basé sur PKP.Nous construisons PKP-DSS à partir du ZK-IDS basé sur PKP en utilisant la transformation Fiat-Shamir (FS) traditionnelle qui convertit les schémas d’identification en schémas de signature. Nous développons une implémentation àtemps constant de PKP-DSS. Il semble que notre schéma soit très compétitif par rapport aux autres schémas de signature FS post-quantiques. Étant donné que PKP est un problème NP-Complet et qu’il n’y a pas d’attaques quantiquesconnues pour résoudre PKP nettement mieux que les attaques classiques, nous pensons que notre schéma est post-quantique.D’autre part, nous étudions les schémas de signature à clé publique de type multivariés qui fournissent des signatures ultra-courtes. Nous analysons d’abord les attaques les plus connues contre les signatures multivariées, puis nous définissons les paramètres minimaux permettant une signatureultra-courte. Nous présentons également de nouveaux modes d’opérations spécifiques afin d’éviter des attaques particulières. Deuxièmement, nous fournissons divers exemples explicites de schémas de signature ultra-courts,pour plusieurs niveaux de sécurité classique, qui sont basés sur des variantes de HFE sur différents corps finis<br>The construction of large quantum computers would endanger most of the public-key cryptographic schemes in use today. Therefore, there is currently a large research effort to develop new post-quantum secure schemes. In particular, we are interested in post-quantum cryptographic schemes whose security relies on the hardness of solving some mathematical problems such as thePermuted Kernel Problem (PKP) and the Hidden Field Equations (HFE). This work investigates first the complexity of PKP. And after a thorough analysis of the State-of-theart attacks of PKP, we have been able to update some results that were not accurate, and to provide an explicit complexity formula which allows us to identify hard instances and secure sets of parameters of this problem. PKP was used in 1989 to develop the first Zero-Knowledge Identification Scheme (ZK-IDS) that has an efficient implementation on low-cost smart cards. In a second step, we optimize the PKP-based ZK-IDS and then we introduce PKP-DSS:a Digital Signature Scheme based on PKP. We construct PKP-DSS from the ZK-IDS based on PKP by using the traditional Fiat-Shamir (FS) transform that converts Identification schemes into Signature schemes. We develop a constant time implementation of PKP-DSS. It appears that our scheme is very competitive with other post-quantum FS signature schemes. Since that PKP is an NP-Complete problem and since there are no known quantum attacks for solving PKP significantly better than classical attacks, we believe that our scheme is post-quantum secure. On the other hand, we study multivariate public-key signature schemes that provide“ultra”-short signatures. We first analyze the most known attacks against multivariate signatures, and then define the minimal parameters that allow ultra-short signature. We also design some specific newmodes of operations in order to avoid particular attacks.Second, we provide various explicit examples of ultra-short signature schemes that are based on variants of HFE. We present parameters for several level of classical security: 80, 90, 100 bits in addition to 128, 192, and 256 bits; foreach level, we propose different choices of finite fields
APA, Harvard, Vancouver, ISO, and other styles
9

Tria, Assia. "Traitement spécifique de la signature acoustique et approche du problème inverse." Montpellier 2, 1994. http://www.theses.fr/1994MON20150.

Full text
Abstract:
La microscopie acoustique, a cours de ces derniers developpements, depasse le stade de l'observation qualitative du materiau a travers les images d'amplitudes et de phase pour atteindre une analyse quantitative des proprietes mecaniques des microstructures. Nous utilisons pour cela l'echo de vibrations mecaniques que l'on focalise sur le materiau a etudier ; il en resulte un signal spatial v(z) qui constitue la signature acoustique du materiau. On extrait de ce signal pseudoperiodique les caracteristiques mecaniques, soit par une analyse harmonique, soit en cherchant les meilleures fonctions fanalytiques approchees rendant compte des resultats. C'est pourquoi, nous avons a envisages les deux methodes suivantes: transformation de fourier completee par l'utilisation de fenetres de ponderation determination d'une fonction analytique dont les parametres sont ajustables. Afin de completer ces modeles, nous nous sommes interesses au probleme inverse qui nous permet grace a un traitement original de remonter directement au pouvoir reflecteur du materiau. Le but de cette these est d'atteindre et d'evaluer les limites de ces differentes methodes d'analyse afin de determiner avec la plus grande precision possible les proprietes elastiques du materiau et de developper un ensemble de logiciels afferents a ces mesures
APA, Harvard, Vancouver, ISO, and other styles
10

Ye, Wei-Ming. "Étude de la pertinence de modélisation paramétrique de signaux pour le test aléatoire des microprocesseurs." Toulouse, INPT, 1987. http://www.theses.fr/1987INPT004H.

Full text
Abstract:
Les methodes d'analyse de signature des signaux de microprocesseurs en test aleatoire permettent de detecter les pannes internes sous une contrainte spatiale. L'analyse est effectuee a la sortie sous la forme d'autocorrelation, d'etude spectrale, de distances cepstrales
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Analyse de signature"

1

Lemelin, Jean-Marc. Signature: Appellation contrôlée. Triptyque, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guyot, Gérard. Signatures spectrales des surfaces naturelles. Paradigme, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mauro, Brilli, and Ogle Neil, eds. The isotopic signature of classical marbles. "L'Erma" di Bretschneider, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

North Atlantic Treaty Organization. Advisory Group for Aerospace Research and Development. Terminology and assessment methods of solid propellant rocket exhaust signatures. AGARD, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lemelin, Jean-Marc. La signature de la contradiction, ou, De la ponctuation. Editions Ponctuation, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barbara, Meier. Geschichtliche Signaturen der Musik bei Mahler, Strauss und Schönberg. K.D. Wagner, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raymond, Hould, and Lusignan Guy, eds. Signatures: Français 3e secondaire : Manuel de l'élève. Éditions du Renouveau pédagogique, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Imberman, Arlyn. Signature for success: How to analyze handwriting and improve your career, your relationships, and your life. Quill Driver Books, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Ann G. Laboratory determination of signature criteria for locating and monitoring abandoned mine fires. U.S. Dept. of the Interior, Bureau of Mines, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Signatures spectrales de roches en milieu tempéré: Valeurs réelles et valeurs perçues par le satellite. Editions du BRGM, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Analyse de signature"

1

Congedo, G., G. Dimauro, A. M. Forte, S. Impedovo, and G. Pirlo. "Selecting reference signatures for on-line signature verification." In Image Analysis and Processing. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/3-540-60298-4_308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Impedovo, Donato, and Giuseppe Pirlo. "Stability Analysis of Static Signatures for Automatic Signature Verification." In Image Analysis and Processing – ICIAP 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24088-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "signature analysis." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Holland, Robin. "Signature Analysis." In Microcomputer Fault-finding and Design. Macmillan Education UK, 1995. http://dx.doi.org/10.1007/978-1-349-13808-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

El Aimani, Laila. "Analysis of StE." In Verifiable Composition of Signature and Encryption. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68112-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

El Aimani, Laila. "Analysis of CtEaS." In Verifiable Composition of Signature and Encryption. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68112-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krishnaswamy, Smita, Igor L. Markov, and John P. Hayes. "Signature-Based Reliability Analysis." In Design, Analysis and Test of Logic Circuits Under Uncertainty. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-90-481-9644-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vogel, Michael, Sebastian Schmerl, and Hartmut König. "Efficient Distributed Signature Analysis." In Managing the Dynamics of Networks and Services. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21484-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yoshimura, Isao, Mitsu Yoshimura, and Shin-ichi Matsuda. "Choice of Multiple Representative Signatures for On-line Signature Verification Using a Clustering Procedure." In Studies in Classification, Data Analysis, and Knowledge Organization. Springer Japan, 1998. http://dx.doi.org/10.1007/978-4-431-65950-1_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhattacharyya, Debnath, Poulami Das, Samir Kumar Bandyopadhyay, and Tai-hoon Kim. "Analysis of Handwritten Signature Image." In Security Technology. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10847-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Analyse de signature"

1

Seow, Olivia, Edward Tiong, Kenneth Teo, et al. "Design Signatures: Mapping Design Innovation Processes." In ASME 2018 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/detc2018-85758.

Full text
Abstract:
Despite variances in contexts and styles of design activity, recurrent patterns emerge in design innovation approaches and processes which lend themselves to analysis and discussion. Using a Design Innovation framework [1] that is built, in part, on the UK Council’s ‘4D’ (Discover, Define, Develop, Deliver) model of design [2], we develop design signatures, graphical maps of design innovation processes. Design signature analyses of four multi-disciplinary industrial case studies illustrate the value of design signatures as useful design activity plots that can be used to plan and manage innovation teams and activities, and to identify critical features for reflection, for clarification, and for further analysis. This work is of interest to design practitioners, managers, researchers, and educators with various motivations, such as to seek a tool to convey and analyze design innovation activity.
APA, Harvard, Vancouver, ISO, and other styles
2

Feng, Renyan, Erman Acar, Stefan Schlobach, Yisong Wang, and Wanwei Liu. "On Sufficient and Necessary Conditions in Bounded CTL: A Forgetting Approach." In 17th International Conference on Principles of Knowledge Representation and Reasoning {KR-2020}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/kr.2020/37.

Full text
Abstract:
Computation Tree Logic (CTL) is one of the central formalisms in formal verification. As a specification language, it is used to express a property that the system at hand is expected to satisfy. From both the verification and the system design points of view, some information content of such property might become irrelevant for the system due to various reasons, e.g., it might become obsolete by time, or perhaps infeasible due to practical difficulties. Then, the problem arises on how to subtract such piece of information without altering the relevant system behaviour or violating the existing specifications over a given signature. Moreover, in such a scenario, two crucial notions are informative: the strongest necessary condition (SNC) and the weakest sufficient condition (WSC) of a given property. To address such a scenario in a principled way, we introduce a forgetting-based approach in CTL and show that it can be used to compute SNC and WSC of a property under a given model and over a given signature. We study its theoretical properties and also show that our notion of forgetting satisfies existing essential postulates of knowledge forgetting. Furthermore, we analyse the computational complexity of some basic reasoning tasks for the fragment CTLAF in particular.
APA, Harvard, Vancouver, ISO, and other styles
3

Gearhart, Chris. "Applications of Wavelet Based Signature Analysis in Designing for Crashworthiness." In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/dac-8592.

Full text
Abstract:
Abstract We present a statistical method for characterizing the information contained in multiple crash pulses. This method uses a wavelet expansion to give a compact representation of each of the crash pulses analyzed. A probable distribution of the wavelet coefficients representing each pulse is calculated. Bayesian inference is used to determine the most probable subset of wavelet coefficients needed to describe the data sets. This subset forms a signature that is representative of all the crash pulses used for the analysis. For tests we have analyzed the wavelet signatures typically consist of 10 to 20 wavelet coefficients which can be associated with specific subsystems in the vehicle. These signatures can be used as a basis for measuring correlation between pulses. We demonstrate this by comparing signatures taken from two types of sedans and from two types of trucks. Correlation between CAE analysis and test results or between CAE analysis and design objectives are also possible. We present results from one application in which correlation, based on wavelet signatures, is used to move a crash worthiness concept model toward a specified design target.
APA, Harvard, Vancouver, ISO, and other styles
4

Di Lecce, V., G. Dimauro, A. Guerriero, et al. "Selection of reference signatures for automatic signature verification." In Proceedings of the Fifth International Conference on Document Analysis and Recognition. ICDAR '99 (Cat. No.PR00318). IEEE, 1999. http://dx.doi.org/10.1109/icdar.1999.791858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

De A. S. M., Juliana, and Márjory Da Costa-Abreu. "An evaluation of a three-modal hand-based database to forensic-based gender recognition." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13989.

Full text
Abstract:
In recent years, behavioural soft-biometrics have been widely used to improve biometric systems performance. Information like gender, age and ethnicity can be obtained from more than one behavioural modality. In this paper, we propose a multimodal hand-based behavioural database for gender recognition. Thus, our goal in this paper is to evaluate the performance of the multimodal database. For this, the experiment was realised with 76 users and was collected keyboard dynamics, touchscreen dynamics and handwritten signature data. Our approach consists of compare two-modal and one-modal modalities of the biometric data with the multimodal database. Traditional and new classifiers were used and the statistical Kruskal-Wallis to analyse the accuracy of the databases. The results showed that the multimodal database outperforms the other databases.
APA, Harvard, Vancouver, ISO, and other styles
6

Sherman, Peter, Rachel Dudley, and Mitchell Suarez. "Blade-to-Blade Variability of the Pressure Associated With an Axial Compressor." In ASME 1995 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/95-gt-442.

Full text
Abstract:
This work investigates the use of statistical and time/frequency analysis of the downstream pressure signature to characterize blade-to-blade variability of both average and residual pressure associated with a single row 36 blade axial compressor. Analysis of the average pressure signatures suggests that the blade mean pressure signatures are not identical at a 90% significance level. Analysis of the residual signatures, obtained by removing the average signatures, reveals that the wake region contains approximately four times as much power as the core flow region. Time-frequency analysis shows that the strong harmonic content which persists in the residual process is temporally concentrated in the wake flow region, but that the blade-to-blade variability of this narrowband structure is sufficient to be almost eliminated upon averaging of individual blade spectra.
APA, Harvard, Vancouver, ISO, and other styles
7

Moukalled, F., N. Ghaddar, H. Kabbani, N. Khaled, and Z. Fawaz. "Numerical and Experimental Investigation of Thermal Signatures of Buried Landmines in Dry Soil." In ASME 2005 Summer Heat Transfer Conference collocated with the ASME 2005 Pacific Rim Technical Conference and Exhibition on Integration and Packaging of MEMS, NEMS, and Electronic Systems. ASMEDC, 2005. http://dx.doi.org/10.1115/ht2005-72304.

Full text
Abstract:
This paper reports a numerical and experimental investigation conducted to study the surface thermal signature of buried landmines. Numerical predictions are obtained by solving an unsteady three-dimensional energy balance model for heat transport in dry soil with a buried mine using the conservative finite-volume method. The model is validated by comparing generated results against published analytical and numerical data in addition to indoor measurements performed on dry soil inside an environmental chamber. The thermal signatures are observed while cooling takes place after exposing the soil surface to a radiant heat flux for a specified period. Transient temperature profiles produced numerically agree well with thermocouple measurements recorded at shallow soil depths and with surface IR images. The difference between predicted and measured surface temperatures is less than 0.4°C and the difference in thermal signature is less than 0.3°C. Sit in. The numerical model is also used to predict perturbations of the expected thermal signatures that are compared to the real (measured) ones from the IR images. The thermographic analysis shows good promise as a method for detecting shallowly buried land mines where not only the temperature difference or contrast images generated by the thermal signatures are matched between the IR images and the simulation images with high accuracy, but also the absolute temperatures for many images generated at discrete time intervals.
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Huan, Natalie Baddour, and Ming Liang. "Effects of Parameter Selection on Oscillatory Behavior-Based Signal Decomposition for Bearing Fault Signature Extraction." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-59391.

Full text
Abstract:
Oscillatory Behavior-based Signal Decomposition (OBSD) is a new technique which employs Morphological Component Analysis (MCA) and the Tunable Q-factor Wavelet Transform (TQWT) to decompose a signal into components consisting of different oscillatory behaviors rather than different frequency bands or scales. Due to the low oscillatory transients of bearing fault-induced signals, this method shows promise for application to effectively extract bearing fault signatures from raw signals contaminated by interferences and noise. In this paper, the application of OBSD to bearing fault signature extraction is investigated. It is shown that the quality of the results obtained via the OBSD is highly dependent on the selection of method-related parameters. The effects of each parameter on the performance of the OBSD for bearing fault signature extraction are investigated. The analysis is also validated by implementing the OBSD on experimental data collected from a test rig with a defective bearing.
APA, Harvard, Vancouver, ISO, and other styles
9

Rivola, Alessandro, and Paul R. White. "Use of Higher Order Spectra in Condition Monitoring: Simulation and Experiments." In ASME 1999 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1999. http://dx.doi.org/10.1115/detc99/vib-8332.

Full text
Abstract:
Abstract In the field of machine condition monitoring one can observe that a link exists between machine vibrations and its health condition, that is, there is a change in the machine vibration signature when machine faults occur. Damages occurring in machine elements are often related to non-linear effects, which may lead to non-linearities in the machine vibration. This paper concerns the study of some systems by means of techniques based on Higher Order Spectra (HOS). These techniques are particularly useful in the situation where only a single measurement sensor is available. If a process is Gaussian then HOS provide no information that cannot be obtained from the second order statistics. On the contrary, HOS give information about a signal’s non-Gaussianity. Since a Gaussian input passing through a linear system leads to a Gaussian output, assuming the signal as an output of a system with a Gaussian input, then HOS make it possible to analyse the structure of the output signal and to provide information related to the non-linearity within the system. A simple model is presented with the aim of showing the effectiveness of the normalised version of polyspectra in detecting different kinds of system non-linearities. HOS are used to interpret the signal structure and the system’s physical characteristics. Moreover, two experimental cases are presented. The HOS are applied to detect the presence of a fatigue crack in a straight beam and to analyse the vibration signal measured on a test bench for rolling element bearings. Both third and fourth order spectra seem to provide a possibility of using HOS as a condition monitoring tool.
APA, Harvard, Vancouver, ISO, and other styles
10

McGee, C. Gavin, and Douglas E. Adams. "Simulating and Detecting a Vibration-Induced Failure in an Air-Handling Assembly." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/vib-21501.

Full text
Abstract:
Abstract Excessive vibrations usually cause mechanical parts to fail. This paper describes a vibration-induced failure in an air handling assembly. Cyclic impacts between a valve and a set of powdered metal bushings cause the failure. A variety of signal processing techniques are used to analyze experimental response data from the failing part including standard spectral signature approaches (i.e. Fourier, cepstral) in addition to more advanced time-frequency analysis techniques (i.e. wavelet contour maps). The theory and application of each method is reviewed in the context of the specific failure mode under consideration. The paper demonstrates that where friction or impact related vibrations are present, structural dynamic “health” monitoring schemes can be used to track changes in operating response signatures and schedule condition-based maintenance or re-design.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Analyse de signature"

1

Solovyanenko, N. I. LEGAL REGULATION OF THE USE OF ELECTRONIC SIGNATURES IN ELECTRONIC COMMERCE. DOI CODE, 2021. http://dx.doi.org/10.18411/0131-5226-2021-70002.

Full text
Abstract:
The article is devoted to the legal problems of using documents signed with electronic signatures in electronic commerce. The article considers the different legal regime of electronic documents depending on the type of electronic signature. Legal features of a qualified electronic signature are analyzed. The legal status of a certification service provider and its legal functions in e-commerce are examined. The conclusion is made about the recognition of electronic documents as a priority method of legal interaction in the field of electronic commerce and the complication of the legal construction of an electronic signature.
APA, Harvard, Vancouver, ISO, and other styles
2

Efurd, D. W., and D. J. Rokop. Isotopic signatures by bulk analyses. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/554812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vliet, Scott D. Van Der. Magnetic Signature Analysis & Validation System. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada409220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Castleberry, K. N. High-vibration detection using motor current signature analysis. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/366465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tow, D. M., J. G. Rodriguez, R. L. Williamson, and L. G. Blackwood. FY-93 noncontacting acoustic ultrasonic signature analysis development. Office of Scientific and Technical Information (OSTI), 1994. http://dx.doi.org/10.2172/10191367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dogaru, Traian, Calvin Le, and Getachew Kirose. Time-Frequency Analysis of a Moving Human Doppler Signature. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada494931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cuschieri, J. M., D. Vendittis, and S. Frandsen. AUV Self Noise Control and Acoustic Signature Experimental Analysis. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada625212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Castleberry, K. N. Instrumentation for motor-current signature analysis using synchronous sampling. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/273820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Blakeman, E. D., and R. C. Kryter. Noninvasive testing of solenoid-operated valves using transient current signature analysis. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/463637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ross, S., B. Brisco, R. J. Brown, S. Yun, and G. Staples. Temporal Signature Analysis of Rice Paddies Using RADARSAT-1: Preliminary Results. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1998. http://dx.doi.org/10.4095/219358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography