Sciweavers

507 search results - page 90 / 102
» The XTR Public Key System
Sort
View
ICICS
2003
Springer
15 years 2 months ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 2 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
96
Voted
IPPS
2009
IEEE
15 years 4 months ago
Portable builds of HPC applications on diverse target platforms
—High-end machines at modern HPC centers are constantly undergoing hardware and system software upgrades – necessitating frequent rebuilds of application codes. The number of p...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...
USENIX
2007
14 years 12 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
14 years 11 months ago
Indoor Location Prediction Using Multiple Wireless Received Signal Strengths
This paper presents a framework for indoor location prediction system using multiple wireless signals available freely in public or office spaces. We first proabstract architectur...
Kha Tran, Dinh Q. Phung, Brett Adams, Svetha Venka...