Sciweavers

985 search results - page 72 / 197
» On the validity of digital signatures
Sort
View
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 1 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
JUCS
2008
210views more  JUCS 2008»
13 years 9 months ago
Systematic Characterisation of Objects in Digital Preservation: The eXtensible Characterisation Languages
: During the last decades, digital objects have become the primary medium to create, shape, and exchange information. However, in contrast to analog objects such as books that dire...
Christoph Becker, Andreas Rauber, Volker Heydegger...
EMSOFT
2009
Springer
14 years 3 months ago
Adding aggressive error correction to a high-performance compressing flash file system
While NAND flash memories have rapidly increased in both capacity and performance and are increasingly used as a storage device in many embedded systems, their reliability has de...
Yangwook Kang, Ethan L. Miller
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
14 years 24 days ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
HPDC
2010
IEEE
13 years 10 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim