Sciweavers

103 search results - page 17 / 21
» Asymmetric Concurrent Signatures
Sort
View
NPIV
1999
ACM
142views Visualization» more  NPIV 1999»
13 years 11 months ago
ALMOST: Exploring Program Traces
We built a tool to visualize and explore program execution traces. Our goal was to help programmers without any prior knowledge of a program, quickly get enough knowledge about it...
Manos Reniers, Steven P. Reis
ESORICS
2003
Springer
13 years 12 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
BMCBI
2004
97views more  BMCBI 2004»
13 years 6 months ago
Global features of sequences of bacterial chromosomes, plasmids and phages revealed by analysis of oligonucleotide usage pattern
Background: Oligonucleotide frequencies were shown to be conserved signatures for bacterial genomes, however, the underlying constraints have yet not been resolved in detail. In t...
Oleg N. Reva, Burkhard Tümmler
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 4 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
ICPP
2009
IEEE
14 years 1 months ago
End-to-End Study of Parallel Volume Rendering on the IBM Blue Gene/P
—In addition to their role as simulation engines, modern supercomputers can be harnessed for scientific visualization. Their extensive concurrency, parallel storage systems, and...
Tom Peterka, Hongfeng Yu, Robert B. Ross, Kwan-Liu...