Sciweavers

5722 search results - page 440 / 1145
» Security Function Interactions
Sort
View
ECIS
2000
15 years 5 months ago
Electronic Notary System and its Certification Mechanism
We have developed a prototype electronic notary system (CYNOS : CYber NOtary System). CYNOS proves facts by providing the evidence (notary token) of events and/or actions that cou...
Shinichi Nakahara
JSW
2008
101views more  JSW 2008»
15 years 4 months ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
TIT
2008
111views more  TIT 2008»
15 years 4 months ago
The Bounded-Storage Model in the Presence of a Quantum Adversary
An extractor is a function that is used to extract randomness. Given an imperfect random source X and a uniform seed Y , the output (X; Y ) is close to uniform. We study properties...
Robert T. König, Barbara M. Terhal
MOC
2010
14 years 11 months ago
Multigrid in a weighted space arising from axisymmetric electromagnetics
Consider the space of two dimensional vector functions whose components and curl are square integrable with respect to the degenerate weight given by the radial variable. This spac...
Dylan M. Copeland, Jayadeep Gopalakrishnan, Minah ...
SOSP
2003
ACM
16 years 1 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...