Sciweavers

985 search results - page 75 / 197
» On the validity of digital signatures
Sort
View
SPW
1997
Springer
14 years 1 months ago
Secure Books: Protecting the Distribution of Knowledge
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, d...
Ross J. Anderson, Václav Matyás Jr.,...
AMC
2005
256views more  AMC 2005»
13 years 8 months ago
Improved DSA variant for batch verification
Batch verification is a method to verify multiple signatures at once. There are two issues associated with batch verification. One is the security problem and the other is the com...
Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
14 years 3 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
ACSAC
2005
IEEE
14 years 2 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
ICIP
2009
IEEE
14 years 10 months ago
Sparsity And Morphological Diversity For Hyperspectral Data Analysis
Recently morphological diversity and sparsity have emerged as new and effective sources of diversity for Blind Source Separation. Based on these new concepts, novel methods such a...