Sciweavers

4820 search results - page 113 / 964
» Implementing Signatures for C
Sort
View
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
15 years 5 months ago
Signature-based Filtering Techniques for Structural Joins of XML Data
Queries on XML documents typically combine selections on element contents, and, via path expressions, the structural relationships between tagged elements. Efficient support for ...
Huan Huo, Guoren Wang, Chuan Yang, Rui Zhou
CHES
2003
Springer
149views Cryptology» more  CHES 2003»
15 years 5 months ago
Attacking Unbalanced RSA-CRT Using SPA
Abstract. Efficient implementations of RSA on computationally limited devices, such as smartcards, often use the CRT technique in combination with Garner’s algorithm in order to ...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
ECIS
2001
15 years 1 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 12 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
TIT
1998
121views more  TIT 1998»
14 years 11 months ago
Blind Multiuser Detection: A Subspace Approach
—A new multiuser detection scheme based on signal subspace estimation is proposed. It is shown that under this scheme, both the decorrelating detector and the linear minimummean-...
Xiaodong Wang, H. Vincent Poor