Sciweavers

346 search results - page 39 / 70
» Security Arguments for Digital Signatures and Blind Signatur...
Sort
View
135
Voted
DSN
2007
IEEE
15 years 5 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 1 months ago
Authorised Translations of Electronic Documents
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied a...
Jan Piechalski, Andreas U. Schmidt
ECIS
2001
15 years 3 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
141
Voted
IMSA
2001
143views Multimedia» more  IMSA 2001»
15 years 3 months ago
A Collaborative Electronic Laboratory Notebook
We have developed a secure, collaborative, web-based electronic notebook (EN) designed to provide researchers and students with a means to record and share their primary research ...
James D. Myers, Elena S. Mendoza, B. Hoopes
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 11 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa