Sciweavers

1610 search results - page 78 / 322
» Identity Based Multisignatures
Sort
View
GLOBECOM
2006
IEEE
15 years 8 months ago
A Lightweight Secure Solution for RFID
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
Bo Sun, Chung-Chih Li, Yang Xiao
126
Voted
SAINT
2003
IEEE
15 years 8 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
80
Voted
IJCAI
2007
15 years 4 months ago
r-grams: Relational Grams
We introduce relational grams (r-grams). They upgrade n-grams for modeling relational sequences of atoms. As n-grams, r-grams are based on smoothed n-th order Markov chains. Smoot...
Niels Landwehr, Luc De Raedt
134
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Scalable and systematic detection of buggy inconsistencies in source code
Software developers often duplicate source code to replicate functionality. This practice can hinder the maintenance of a software project: bugs may arise when two identical code ...
Mark Gabel, Junfeng Yang, Yuan Yu, Moisés G...
103
Voted
MTA
2007
82views more  MTA 2007»
15 years 2 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli