Sciweavers

6907 search results - page 946 / 1382
» Securing distributed adaptation
Sort
View
127
Voted
ICMCS
1999
IEEE
165views Multimedia» more  ICMCS 1999»
15 years 7 months ago
Template Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyrighted material. This paper describes a method for the secure and robus...
Shelby Pereira, Joseph Ó Ruanaidh, Fr&eacut...
128
Voted
NDSS
1999
IEEE
15 years 7 months ago
Experimenting with Shared Generation of RSA Keys
We describe an implementation of a distributed algorithm to generate a shared RSA key. At the end of the computation, an RSA modulus N = pq is publicly known. All servers involved...
Michael Malkin, Thomas D. Wu, Dan Boneh
153
Voted
JAVA
1999
Springer
15 years 7 months ago
The Gateway System: Uniform Web Based Access to Remote Resources
Exploiting our experience developing the WebFlow system, we designed the Gateway system to provide seamless and secure access to computational resources at ASC MSRC. The Gateway f...
Geoffrey Fox, Tomasz Haupt, Erol Akarsu, Alexey Ka...
147
Voted
FC
1998
Springer
134views Cryptology» more  FC 1998»
15 years 7 months ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan
121
Voted
AUTONOMICS
2007
ACM
15 years 7 months ago
Efficient operation in sensor and actor networks inspired by cellular signaling cascades
The investigation and the development of self-organizing systems are especially needed for operation and control in massively distributed systems such as Sensor and Actor Networks...
Falko Dressler, Isabel Dietrich, Reinhard German, ...