Sciweavers

563 search results - page 101 / 113
» Verifiable Signature Sharing
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
DDECS
2007
IEEE
201views Hardware» more  DDECS 2007»
14 years 3 months ago
Built in Defect Prognosis for Embedded Memories
: As scan compression replaces the traditional scan it is important to understand how it works with power. DFT MAX represents one of the two primary scan compression solutions used...
Prashant Dubey, Akhil Garg, Sravan Kumar Bhaskaran...
KBSE
2007
IEEE
14 years 3 months ago
Towards supporting awareness of indirect conflicts across software configuration management workspaces
Workspace awareness techniques have been proposed to enhance the effectiveness of software configuration management systems in coordinating parallel work. These techniques share i...
Anita Sarma, Gerald Bortis, André van der H...
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
14 years 3 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
CCS
2007
ACM
14 years 3 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu