Sciweavers

6941 search results - page 69 / 1389
» Testing as a Certification Approach
Sort
View
JNW
2006
149views more  JNW 2006»
13 years 7 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
SAC
2006
ACM
13 years 7 months ago
Assisted verification of elementary functions using Gappa
The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall er...
Florent de Dinechin, Christoph Quirin Lauter, Guil...
COMPSEC
2004
95views more  COMPSEC 2004»
13 years 7 months ago
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media ...
Dimitrios Lekkas, Dimitris Gritzalis
SEKE
2010
Springer
13 years 6 months ago
An Empirical Evaluation on the Relationship Between Final Auction Price and Shilling Activity in Online Auctions
In this paper, we are interested in the relationship between final prices of online auctions and possible shill activities during those auctions. We conduct experiments on real auc...
Fei Dong, Sol M. Shatz, Haiping Xu
ERSA
2007
108views Hardware» more  ERSA 2007»
13 years 9 months ago
Performance Evaluation of Two Allocation Schemes for Combinatorial Group Testing Fault Isolation
- Two fault isolation approaches based on Combinatorial Group Testing (CGT) are presented. Although they both share the basic principle of grouping suspect resources into subgroups...
Rawad N. Al-Haddad, Carthik A. Sharma, Ronald F. D...