Sciweavers

563 search results - page 49 / 113
» Verifiable Signature Sharing
Sort
View
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
14 years 19 days ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
14 years 3 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
SECON
2008
IEEE
14 years 3 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
FPL
2007
Springer
105views Hardware» more  FPL 2007»
14 years 3 months ago
Time Predictable CPU and DMA Shared Memory Access
In this paper, we propose a first step towards a time predictable computer architecture for single-chip multiprocessing (CMP). CMP is the actual trend in server and desktop syste...
Christof Pitter, Martin Schoeberl
ICDE
2006
IEEE
142views Database» more  ICDE 2006»
14 years 3 months ago
Location-based Spatial Queries with Data Sharing in Mobile Environments
Mobile clients feature increasingly sophisticated wireless networking support that enables realtime information exchange with remote databases. Location-dependent queries, such as...
Wei-Shinn Ku, Roger Zimmermann