Sciweavers

653 search results - page 102 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
ECIS
2000
13 years 10 months ago
Modelling in the Digital World - An Anti-Realist Perspective
This paper considers how we are constructing and modelling digital realities, and considers the relationships between digital realities and our reality using concepts from traditio...
Matthew J. Dovey
IVC
2008
93views more  IVC 2008»
13 years 9 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang
CCS
2009
ACM
14 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
SAC
2006
ACM
13 years 9 months ago
Efficient interactive configuration of unbounded modular systems
Interactive configuration guides a user searching through a large combinatorial space of solutions to a system of constraints. We investigate a class of very expressive underlying...
Erik Roland van der Meer, Andrzej Wasowski, Henrik...
EAGC
2003
Springer
14 years 2 months ago
Automatic Services Discovery, Monitoring and Visualization of Grid Environments: The MapCenter Approach
The complexity of Grid environments is growing as more projects and applications appear in this quick-evolving domain. Widespread applications are distributed over thousands of com...
Franck Bonnassieux, Robert Harakaly, Pascale Prime...