Sciweavers

487 search results - page 43 / 98
» Integral Invariant Signatures
Sort
View
DILS
2006
Springer
14 years 1 months ago
Collection-Oriented Scientific Workflows for Integrating and Analyzing Biological Data
Steps in scientific workflows often generate collections of results, causing the data flowing through workflows to become increasingly nested. Because conventional workflow compone...
Timothy M. McPhillips, Shawn Bowers, Bertram Lud&a...
ISCC
2006
IEEE
14 years 3 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
ACSAC
2003
IEEE
14 years 3 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
CORR
2008
Springer
102views Education» more  CORR 2008»
13 years 10 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
TIT
1998
121views more  TIT 1998»
13 years 9 months ago
Blind Multiuser Detection: A Subspace Approach
—A new multiuser detection scheme based on signal subspace estimation is proposed. It is shown that under this scheme, both the decorrelating detector and the linear minimummean-...
Xiaodong Wang, H. Vincent Poor