Sciweavers

563 search results - page 72 / 113
» Verifiable Signature Sharing
Sort
View
133
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
124
Voted
DAC
1999
ACM
16 years 4 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...
117
Voted
WWW
2004
ACM
16 years 4 months ago
Copyright protection on the web: a hybrid digital video watermarking scheme
Video is one of the most popular data shared in the Web, and the protection of video copyright is of vast interest. In this paper, we present a comprehensive approach for protecti...
Pat Pik-Wah Chan, Michael R. Lyu, Roland T. Chin
140
Voted
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
16 years 3 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima
234
Voted
POPL
2007
ACM
16 years 3 months ago
Modular verification of a non-blocking stack
This paper contributes to the development of techniques for the modular proof of programs that include concurrent algorithms. We present a proof of a non-blocking concurrent algor...
Matthew J. Parkinson, Richard Bornat, Peter W. O'H...