Sciweavers

563 search results - page 49 / 113
» Verifiable Signature Sharing
Sort
View
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
15 years 3 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 6 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
SECON
2008
IEEE
15 years 6 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
FPL
2007
Springer
105views Hardware» more  FPL 2007»
15 years 6 months ago
Time Predictable CPU and DMA Shared Memory Access
In this paper, we propose a first step towards a time predictable computer architecture for single-chip multiprocessing (CMP). CMP is the actual trend in server and desktop syste...
Christof Pitter, Martin Schoeberl
ICDE
2006
IEEE
142views Database» more  ICDE 2006»
15 years 5 months ago
Location-based Spatial Queries with Data Sharing in Mobile Environments
Mobile clients feature increasingly sophisticated wireless networking support that enables realtime information exchange with remote databases. Location-dependent queries, such as...
Wei-Shinn Ku, Roger Zimmermann