Sciweavers

53 search results - page 3 / 11
» Cryptoschemes Based on New Signature Formation Mechanism
Sort
View
RECOMB
2008
Springer
14 years 8 months ago
Estimating the Relative Contributions of New Genes from Retrotransposition and Segmental Duplication Events during Mammalian Evo
Gene duplication has long been recognized as a major force in genome evolution and has recently been recognized as an important source of individual variation. For many years the o...
Jin Jun, Paul Ryvkin, Edward Hemphill, Ion I. Mand...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 7 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
APWEB
2006
Springer
13 years 11 months ago
Named Graphs as a Mechanism for Reasoning About Provenance
Named Graphs is a simple, compatible extension to the RDF syntax that enables statements to be made about RDF graphs. This approach is in contrast to earlier attempts such as RDF r...
E. Rowland Watkins, Denis A. Nicole
CCS
2003
ACM
14 years 29 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
ESORICS
2008
Springer
13 years 9 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...