Sciweavers

787 search results - page 110 / 158
» Subversion-Resilient Signature Schemes
Sort
View
MASCOTS
2010
14 years 11 months ago
PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing
To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel patterndriven application consolidation (PAC) system to achieve efficie...
Zhenhuan Gong, Xiaohui Gu
ICC
2008
IEEE
107views Communications» more  ICC 2008»
15 years 4 months ago
Multiuser Two-Way Relaying for Interference Limited Systems
—We investigate multiuser two-way relaying strategies for interference limited systems where multiple pairs of users exchange information with their partners via an intermediate ...
Min Chen, Aylin Yener
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 3 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
APNOMS
2006
Springer
15 years 1 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
PDPTA
2004
14 years 11 months ago
Verification of Parity Data in Large Scale Storage Systems
Highly available storage uses replication and other redundant storage to recover from a component failure. If parity data calculated from an erasure correcting code is not updated...
Thomas J. E. Schwarz