Sciweavers

563 search results - page 40 / 113
» Verifiable Signature Sharing
Sort
View
TDSC
2010
172views more  TDSC 2010»
13 years 3 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
MASCOTS
2010
13 years 10 months ago
PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing
To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel patterndriven application consolidation (PAC) system to achieve efficie...
Zhenhuan Gong, Xiaohui Gu
ICICS
2003
Springer
14 years 2 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
TABLETOP
2007
IEEE
14 years 3 months ago
Photohelix: Browsing, Sorting and Sharing Digital Photo Collections
In this paper we debut Photohelix, a novel interactive system for browsing, sorting and sharing digital images. We present our design rationale for such a system and introduce Pho...
Otmar Hilliges, Dominikus Baur, Andreas Butz
HASE
2005
IEEE
14 years 2 months ago
Safe Allocation of Avionics Shared Resources
We propose an approach to analyse the safety of avionic systems that takes into account the impact of computation and communication resource sharing. The approach is made of three...
Laurent Sagaspe, Gérard Bel, Pierre Bieber,...