Sciweavers

2492 search results - page 3 / 499
» On the General Signature Trees
Sort
View
EUROMICRO
1996
IEEE
13 years 11 months ago
Software Monitoring and Debugging Using Compressed Signature Sequences
Signature based error detection techniques (e.g. the application of watchdog processors) can be easily extended to support software debugging. The run-time sequence of signatures ...
István Majzik
CHINAF
2008
110views more  CHINAF 2008»
13 years 7 months ago
Classification of signature-only signature models
We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoret...
Zhengjun Cao, Mulan Liu
IACR
2011
104views more  IACR 2011»
12 years 7 months ago
Short Transitive Signatures for Directed Trees
A transitive signature scheme allows to sign a graph in such a way that, given the signatures of edges (a, b) and (b, c), it is possible to compute the signature for the edge (or ...
Philippe Camacho, Alejandro Hevia
PKC
2009
Springer
142views Cryptology» more  PKC 2009»
14 years 8 months ago
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
This paper describes new methods in pairing-based signature schemes for identifying the invalid digital signatures in a batch, after batch verification has failed. These methods ef...
Brian J. Matt
DSN
2011
IEEE
12 years 7 months ago
Communix: A framework for collaborative deadlock immunity
—We present Communix, a collaborative deadlock immunity framework for Java programs. Deadlock immunity enables applications to avoid deadlocks that they previously encountered. D...
Horatiu Jula, Pinar Tözün, George Candea