Sciweavers

495 search results - page 82 / 99
» Signed quorum systems
Sort
View
WWW
2003
ACM
15 years 10 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
VLDB
2007
ACM
161views Database» more  VLDB 2007»
15 years 9 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
70
Voted
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 6 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
86
Voted
ARITH
2009
IEEE
15 years 4 months ago
Fully Redundant Decimal Arithmetic
Hardware implementation of all the basic radix-10 arithmetic operations is evolving as a new trend in the design and implementation of general purpose digital processors. Redundan...
Saeid Gorgin, Ghassem Jaberipur
91
Voted
MCS
2009
Springer
15 years 4 months ago
Recoding Error-Correcting Output Codes
Abstract. One of the most widely applied techniques to deal with multiclass categorization problems is the pairwise voting procedure. Recently, this classical approach has been emb...
Sergio Escalera, Oriol Pujol, Petia Radeva