Sciweavers

319 search results - page 26 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
JCP
2008
216views more  JCP 2008»
14 years 9 months ago
Direct Anonymous Attestation for Next Generation TPM
Trusted computing platforms have been proposed as a promising approach to enhance the security of general-purpose computing systems. Direct Anonymous Attestation(DAA) is a scheme t...
Xiaofeng Chen 0004, Dengguo Feng
INFOCOM
2012
IEEE
13 years 3 days ago
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers
Abstract—In this paper, we implement and evaluate three different Byzantine Fault-Tolerant (BFT) state machine replication protocols for data centers: (1) BASIC: The classic solu...
Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya
49
Voted
ISCC
2006
IEEE
15 years 3 months ago
Security for the Mythical Air-Dropped Sensor Network
The research area of very large scale wireless sensor networks made of low-cost sensors is gaining a lot of interest as witnessed by the large number of published papers. The secu...
Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andr...
IJCAI
1993
14 years 11 months ago
A Tractable Class of Abduction Problems
literal: Let p be a proposition. Then p and -p are literals. clause: A clause is a disjunction of literals. Horn Clause: A Horn Clause is a clause in which there is at most one po...
Kave Eshghi
104
Voted
SMI
2006
IEEE
144views Image Analysis» more  SMI 2006»
15 years 3 months ago
Robust Alignment of Multi-view Range Data to CAD Model
Surface matching is a common task in computer graphics and computer vision. In this paper, we introduce a novel algorithm that aligns scanned point-based surfaces to the related 3...
Xinju Li, Igor Guskov, Jacob Barhak