Sciweavers

380 search results - page 36 / 76
» Time Capsule Signature
Sort
View
ISW
2001
Springer
14 years 28 days ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?â€...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
DATE
1999
IEEE
80views Hardware» more  DATE 1999»
14 years 25 days ago
Symmetric Transparent BIST for RAMs
The paper introduces the new concept of symmetric transparent BIST for RAMs. This concept allows to skip the signature prediction phase of conventional transparent BIST approaches...
Sybille Hellebrand, Hans-Joachim Wunderlich, Vyach...
MOBISYS
2008
ACM
14 years 8 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
CCS
2008
ACM
13 years 10 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
PAMI
2010
162views more  PAMI 2010»
13 years 3 months ago
Differential Earth Mover's Distance with Its Applications to Visual Tracking
The Earth Mover's Distance (EMD) is a similarity measure that captures perceptual difference between two distributions. Its computational complexity, however, prevents a direc...
Qi Zhao, Zhi Yang, Hai Tao