Sciweavers

1094 search results - page 107 / 219
» List signature schemes
Sort
View
JNW
2008
116views more  JNW 2008»
13 years 8 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
MSWIM
2006
ACM
14 years 4 months ago
An efficient multicast packet delivery scheme for UMTS
In this paper we present an efficient scheme for the multicast transmission of the data in the Universal Mobile Telecommunications System (UMTS). We take advantage of the tree top...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
ACSAC
2009
IEEE
14 years 2 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
ICIP
2009
IEEE
14 years 11 months ago
Principal Moments For Efficient Representation Of 2d Shape
The analytic signature is a recently proposed 2D shape representation scheme. It is tailored to the representation of shapes described by arbitrary sets of unlabeled points, or la...
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
14 years 4 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak