Sciweavers

1094 search results - page 120 / 219
» List signature schemes
Sort
View
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
14 years 4 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...
PODC
2003
ACM
14 years 3 months ago
Oblivious signature-based envelope
We propose a new cryptographic primitive called oblivious signaturebased envelope (OSBE). Informally, an OSBE scheme enables a sender to send an envelope (encrypted message) to a ...
Ninghui Li, Wenliang Du, Dan Boneh
MASCOTS
2010
13 years 11 months ago
PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing
To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel patterndriven application consolidation (PAC) system to achieve efficie...
Zhenhuan Gong, Xiaohui Gu
ICC
2008
IEEE
107views Communications» more  ICC 2008»
14 years 4 months ago
Multiuser Two-Way Relaying for Interference Limited Systems
—We investigate multiuser two-way relaying strategies for interference limited systems where multiple pairs of users exchange information with their partners via an intermediate ...
Min Chen, Aylin Yener
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
14 years 3 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz