Sciweavers

625 search results - page 107 / 125
» Generalized Ring Signatures
Sort
View
CASES
2005
ACM
13 years 9 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 8 months ago
Finding, minimizing, and counting weighted subgraphs
d Abstract] Virginia Vassilevska School of Mathematics Institute for Advanced Study Princeton, NJ 08540 USA virgi@math.ias.edu Ryan Williams School of Mathematics Institute for Adv...
Virginia Vassilevska, Ryan Williams
ICDE
2006
IEEE
183views Database» more  ICDE 2006»
14 years 1 months ago
Similarity Queries on Structured Data in Structured Overlays
Structured P2P systems based on distributed hash tables are a popular choice for building large-scaled data management systems. Generally, they only support exact match queries, b...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
IPMI
2009
Springer
14 years 8 months ago
DRAMMS: Deformable Registration via Attribute Matching and Mutual-Saliency weighting
A general-purpose deformable registration algorithm referred to as ”DRAMMS” is presented in this paper. DRAMMS adds to the literature of registration methods that bridge betw...
Yangming Ou, Christos Davatzikos
ICS
2010
Tsinghua U.
14 years 5 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...