Sciweavers

112 search results - page 9 / 23
» Generalized Certificate Revocation
Sort
View
SEAA
2008
IEEE
14 years 4 months ago
Towards Efficient Software Component Evaluation: An Examination of Component Selection and Certification
When software systems incorporate existing software components, there is a need to evaluate these components. Component evaluation is of two kinds according to literature: compone...
Rikard Land, Alexandre Alvaro, Ivica Crnkovic
SAC
2008
ACM
13 years 9 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
AMW
2010
13 years 11 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
CC
2010
Springer
117views System Software» more  CC 2010»
13 years 7 months ago
Efficiently Certifying Non-Integer Powers
We describe a randomized algorithm that, given an integer a, produces a certificate that the integer is not a pure power of an integer in expected (log a)1+o(1) bit operations unde...
Erich Kaltofen, Mark Lavin
JOT
2008
153views more  JOT 2008»
13 years 9 months ago
I Resign: Resigning Jar Files with Initium
This paper describes how to resign Jar files. Jar files (Java archives) are used by technologies (like Java Web Start) to deploy applications that are run with increased privilege...
Douglas Lyon