Sciweavers

683 search results - page 42 / 137
» Unique Group Signatures
Sort
View
DSOM
2003
Springer
15 years 5 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
BMCBI
2010
94views more  BMCBI 2010»
14 years 12 months ago
A high-throughput pipeline for the design of real-time PCR signatures
Background: Pathogen diagnostic assays based on polymerase chain reaction (PCR) technology provide high sensitivity and specificity. However, the design of these diagnostic assays...
Ravi Vijaya Satya, Kamal Kumar, Nela Zavaljevski, ...
BMCBI
2008
155views more  BMCBI 2008»
14 years 12 months ago
Prediction of regulatory elements in mammalian genomes using chromatin signatures
Background: Recent genomic scale survey of epigenetic states in the mammalian genomes has shown that promoters and enhancers are correlated with distinct chromatin signatures, pro...
Kyoung-Jae Won, Iouri Chepelev, Bing Ren, Wei Wang
MOBICOM
2010
ACM
15 years 22 hour ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 7 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes