Sciweavers

1610 search results - page 84 / 322
» Identity Based Multisignatures
Sort
View
ICPP
1987
IEEE
15 years 5 months ago
A Software-Based Hardware Fault Tolerance Scheme for Multicomputers
-- A hardware fault tolerance scheme for large multicomputers executing time-consuming non-interactive applications is described. Error detection and recovery are done mostly by so...
Yuval Tamir, Eli Gafni
SEC
2007
15 years 3 months ago
A Hybrid PKI-IBC Based Ephemerizer System
The concept of an Ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The princ...
Srijith Krishnan Nair, Muhammad Torabi Dashti, Bru...
IJNSEC
2008
146views more  IJNSEC 2008»
15 years 1 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
EAAI
2007
101views more  EAAI 2007»
15 years 1 months ago
Fault detection for nonlinear systems with uncertain parameters based on the interval fuzzy model
In the paper an application of the interval fuzzy model (INFUMO) in fault detection for nonlinear systems with uncertain intervaltype parameters is presented. A confidence band f...
Simon Oblak, Igor Skrjanc, Saso Blazic
IJNSEC
2007
107views more  IJNSEC 2007»
15 years 1 months ago
A Traitor Tracing Scheme Based on the RSA System
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...
Bo Yang, Hua Ma, Shenglin Zhu