Sciweavers

350 search results - page 57 / 70
» Improving application security with data flow assertions
Sort
View
ATAL
2004
Springer
14 years 1 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
INDOCRYPT
2001
Springer
14 years 5 days ago
A New Anonymous Fingerprinting Scheme with High Enciphering Rate
We propose a new anonymous fingerprinting scheme using Okamoto-Uchiyama cryptosystem[1]. In the previous schemes[2]-[4] the enciphering rate is so small that it seems very difficu...
Minoru Kuribayashi, Hatsukazu Tanaka
RTAS
1996
IEEE
13 years 12 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
14 years 9 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
ICC
2007
IEEE
126views Communications» more  ICC 2007»
14 years 2 months ago
Estimating Ridge Topologies with High Curvature for Fingerprint Authentication Systems
— An orientation model provides an analytical means for describing fingerprint ridge orientations. It can help in data storage and recovery as well as other possible communicati...
Yi Wang, Jiankun Hu