Sciweavers

563 search results - page 48 / 113
» Verifiable Signature Sharing
Sort
View
ICN
2005
Springer
14 years 2 months ago
Reliable Mobile Ad Hoc P2P Data Sharing
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
IFM
2010
Springer
142views Formal Methods» more  IFM 2010»
13 years 7 months ago
An Event-B Approach to Data Sharing Agreements
A Data Sharing Agreement (DSA) is a contract among two or more principals regulating how they share data. Agreements are usually represented as a set of clauses expressed using the...
Alvaro E. Arenas, Benjamin Aziz, Juan Bicarregui, ...
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 3 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
CDVE
2004
Springer
109views Visualization» more  CDVE 2004»
14 years 2 months ago
Interest Management for Collaborative Environments Through Dividing Their Shared State
Not all participants in a collaborative virtual environment (CVE) need to be informed of every other participant’s activities. The technique used for filtering irrelevant message...
Michal Masa, Jiri Zara
ICCTA
2007
IEEE
14 years 23 days ago
Register Sharing Verification During Data-Path Synthesis
The variables of the high-level specifications and the automatically generated temporary variables are mapped on to the data-path registers during data-path synthesis phase of hig...
Chandan Karfa, Chittaranjan A. Mandal, Dipankar Sa...