Sciweavers

563 search results - page 58 / 113
» Verifiable Signature Sharing
Sort
View
JCP
2006
116views more  JCP 2006»
13 years 9 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...
PAA
2008
13 years 8 months ago
Diagnosis of lung nodule using Moran's index and Geary's coefficient in computerized tomography images
This paper analyzes the application of Moran's index and Geary's coefficient to the characterization of lung nodules as malignant or benign in computerized tomography ima...
Erick Corrêa da Silva, Aristófanes Co...
AINA
2006
IEEE
14 years 3 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick
CGO
2005
IEEE
14 years 2 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
ISCA
2009
IEEE
199views Hardware» more  ISCA 2009»
14 years 3 months ago
SigRace: signature-based data race detection
Detecting data races in parallel programs is important for both software development and production-run diagnosis. Recently, there have been several proposals for hardware-assiste...
Abdullah Muzahid, Darío Suárez Graci...