Sciweavers

3821 search results - page 723 / 765
» A Security Model for Aglets
Sort
View
AUTONOMICS
2008
ACM
14 years 1 months ago
Emergent engineering for the management of complex situations
Ubiquitous computing and communication environments connect systems and people in unprecedented ways, but also fundamentally challenge the mindset of traditional systems engineeri...
René Doursat, Mihaela Ulieru
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
14 years 1 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
14 years 24 days ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
CONEXT
2008
ACM
14 years 24 days ago
Towards systematic design of enterprise networks
Enterprise networks are important, with size and complexity even surpassing carrier networks. Yet, the design of enterprise networks remains ad-hoc and poorly understood. In this p...
Yu-Wei Eric Sung, Sanjay G. Rao, Geoffrey G. Xie, ...
BIOSIG
2008
166views Biometrics» more  BIOSIG 2008»
14 years 14 days ago
Improving Border Control with 3D Face Recognition
: Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 ...
Paul Welti, Jean-Marc Suchier, Christoph Busch