Sciweavers

1833 search results - page 24 / 367
» Mechanized Verification with Sharing
Sort
View
COST
2009
Springer
205views Multimedia» more  COST 2009»
14 years 2 months ago
Ergodic HMM-UBM System for On-Line Signature Verification
Abstract. We propose a novel approach for on-line signature verification based on building HMM user models by adapting an ergodic Universal Background Model (UBM). State initializa...
Enrique Argones-Rúa, David Pérez-Pi&...
BTW
2009
Springer
114views Database» more  BTW 2009»
14 years 2 months ago
Efficient Verification of B-tree Integrity
: The integrity of B-tree structures can become compromised for many reasons. Since these inconsistencies manifest themselves in unpredictable ways, all commercial database managem...
Goetz Graefe, R. Stonecipher
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
14 years 21 days ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
WAIM
2010
Springer
13 years 9 months ago
Trustworthy Information: Concepts and Mechanisms
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin ...
ATAL
2003
Springer
14 years 4 months ago
An incentive compatible reputation mechanism
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is ba...
Radu Jurca, Boi Faltings