Sciweavers

6907 search results - page 178 / 1382
» Securing distributed adaptation
Sort
View
96
Voted
ARCS
2004
Springer
15 years 3 months ago
The SDVM: A Self Distributing Virtual Machine for Computer Clusters
Computer systems of the future will consist more and more of autonomous and cooperative system parts and behave self-organizing. Self-organizing is mainly characterized by adaptive...
Jan Haase, Frank Eschmann, Bernd Klauer, Klaus Wal...
MSWIM
2005
ACM
15 years 3 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
99
Voted
CCS
1999
ACM
15 years 2 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
105
Voted
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
14 years 11 months ago
Template Protection for PCA-LDA-based 3D Face Recognition Systems
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Daniel Hartung
EUROCRYPT
2010
Springer
15 years 3 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...