Sciweavers

563 search results - page 45 / 113
» Verifiable Signature Sharing
Sort
View
FLAIRS
2001
13 years 10 months ago
On the Technological, Human, and Managerial Issues in Sharing Organizational Lessons
Lessons learned systems (LLS) are systems that support a lessons learned process (LLP) to collect, verify, store, disseminate, and reuse organizational lessons. In this paper we e...
Rosina Weber, Len Breslow, Nabil Sandhu
EDBT
2010
ACM
138views Database» more  EDBT 2010»
14 years 1 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
GLVLSI
2010
IEEE
220views VLSI» more  GLVLSI 2010»
13 years 11 months ago
Thermal-aware voltage droop compensation for multi-core architectures
As the rated performance of microprocessors increases, voltage droop emergencies become a significant problem. In this paper, two new techniques to combat voltage droop emergencie...
Jia Zhao, Basab Datta, Wayne P. Burleson, Russell ...
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
13 years 8 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
IPPS
2006
IEEE
14 years 2 months ago
Monitoring remotely executing shared memory programs in software DSMs
Peer-to-Peer (P2P) cycle sharing over the Internet has become increasingly popular as a way to share idle cycles. A fundamental problem faced by P2P cycle sharing systems is how t...
Long Fei, Xing Fang, Y. Charlie Hu, Samuel P. Midk...