Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,884,981 papers from all fields of science
Search
Sign In
Create Free Account
Code signing
Known as:
Driver signing
, Unsigned code
, Authenticode
Expand
Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
"Classic" Mac OS
ActiveX
Alureon
Certificate authority
Expand
Broader (1)
Public key infrastructure
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Trusted Computing Platforms
G. Proudler
,
Liqun Chen
,
Chris I. Dalton
Cambridge International Law Journal
2014
Corpus ID: 34605408
Trusted virtualisation is anticipated to become the dominant form of Trusted Computing in PCs and servers because it enables…
Expand
2010
2010
Extraction of Parallel Application Signatures for Performance Prediction
Alvaro Wong
,
Dolores Rexachs
,
E. Luque
IEEE International Conference on High Performance…
2010
Corpus ID: 17531744
Predicting performance of parallel applications is becoming increasingly complex and the best performance predictor is the…
Expand
Highly Cited
2007
Highly Cited
2007
Lifelong Learning - Signs, Discourses, Practices
R. Usher
,
R. Edwards
2007
Corpus ID: 60139364
EDITORIAL BY SERIES EDITORS.- FOREWORD.- 1. SETTING THE SCENE.- 2. SIGNING THE SOCIAL.- 3. LIFELONG LEARNING AS A SEMIOTIC…
Expand
2002
2002
Compact Application Signatures for Parallel and Distributed Scientific Codes
Charng-Da Lu
,
D. Reed
International Conference on Software Composition
2002
Corpus ID: 2141738
Understanding the dynamic behavior of parallel programs is key to developing efficient system software and runtime environments…
Expand
2001
2001
The Vector Partition Problem for Convex Objective Functions
S. Onn
,
L. Schulman
Mathematics of Operations Research
2001
Corpus ID: 2246524
Thepartition problem concerns the partitioning of a given set ofn vectors ind-space intop parts to maximize an objective function…
Expand
Review
1998
Review
1998
Security concepts and implementation in the Ara mobile agent system
H. Peine
Proceedings Seventh IEEE International Workshop…
1998
Corpus ID: 7454544
We describe the security architecture of the Ara mobile agent platform, after reviewing the relevant aspects of comparable…
Expand
Highly Cited
1998
Highly Cited
1998
Mobile Code Security
A. Rubin
,
Daniel E. Geer
IEEE Internet Computing
1998
Corpus ID: 17018937
Sandboxes, code signing, firewalls, and proof carrying code are all techniques that address the inherent security risks of mobile…
Expand
1994
1994
Component-Oriented Algorithms for Signature Verification
G. Dimauro
,
S. Impedovo
,
G. Pirlo
International journal of pattern recognition and…
1994
Corpus ID: 30631248
Signing is a complex and highly variable process. It results from simple bodily motions of a ballistic nature whose combined…
Expand
1994
1994
Low-background balloon-borne direct search for ionizing massive particles as a component of the dark galactic halo matter
P. McGuire
1994
Corpus ID: 118140626
This dissertation has been submitted in partial fullllment of requirements for an advanced degree at The University of Arizona…
Expand
Highly Cited
1987
Highly Cited
1987
Communication, symbolic communication, and language: Comment on Savage-Rumbaugh, McDonald, Sevcik, Hopkins, and Rupert (1986).
Mark S. Seidenberg
,
L. Petitto
1987
Corpus ID: 18329599
Savage-Rumbaugh, McDonald, Sevcik, Hopkins, and Rupert's (1986) description of their pygmy chimpanzees' behavior raises many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE