Sciweavers

1219 search results - page 121 / 244
» Verification of Equivalent-Results Methods
Sort
View
176
Voted
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
15 years 1 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
POPL
2010
ACM
16 years 26 days ago
A Verified Compiler for an Impure Functional Language
We present a verified compiler to an idealized assembly language from a small, untyped functional language with mutable references and exceptions. The compiler is programmed in th...
Adam J. Chlipala
HPDC
2010
IEEE
15 years 4 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim
96
Voted
ICIP
2002
IEEE
16 years 5 months ago
Spatial frequency domain image processing for biometric recognition
Biometric recognition refers to the process of matching an input biometric to stored biometric information. In particular, biometric verification refers to matching the live biome...
B. V. K. Vijaya Kumar, Chunyan Xie, Marios Savvide...
HPCA
2003
IEEE
16 years 3 months ago
Caches and Hash Trees for Efficient Memory Integrity
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications s...
Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, M...