Sciweavers

1094 search results - page 121 / 219
» List signature schemes
Sort
View
APNOMS
2006
Springer
14 years 1 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
PDPTA
2004
13 years 11 months ago
Verification of Parity Data in Large Scale Storage Systems
Highly available storage uses replication and other redundant storage to recover from a component failure. If parity data calculated from an erasure correcting code is not updated...
Thomas J. E. Schwarz
JCP
2007
88views more  JCP 2007»
13 years 10 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
HPDC
2012
IEEE
12 years 13 days ago
Exploring the performance and mapping of HPC applications to platforms in the cloud
This paper presents a scheme to optimize the mapping of HPC applications to a set of hybrid dedicated and cloud resources. First, we characterize application performance on dedica...
Abhishek Gupta, Laxmikant V. Kalé, Dejan S....
SIROCCO
2001
13 years 11 months ago
Characterization of Networks Supporting Multi-dimensional Linear Interval Routing Schemes
An Interval Routing Scheme (IRS) is a well-known, space efficient routing strategy for routing messages in a distributed network. In this scheme, each node of the network is assig...
Yashar Ganjali