Sciweavers

143 search results - page 27 / 29
» A Solution to Open Standard of PKI
Sort
View
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 7 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
BMCBI
2004
92views more  BMCBI 2004»
13 years 7 months ago
BioBuilder as a database development and functional annotation platform for proteins
Background: The explosion in biological information creates the need for databases that are easy to develop, easy to maintain and can be easily manipulated by annotators who are m...
J. Daniel Navarro, Naveen Talreja, Suraj Peri, B. ...
WWW
2011
ACM
13 years 2 months ago
Learning to rank with multiple objective functions
We investigate the problem of learning to rank for document retrieval from the perspective of learning with multiple objective functions. We present solutions to two open problems...
Krysta Marie Svore, Maksims Volkovs, Christopher J...
COMPSAC
2009
IEEE
14 years 2 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
ICSM
2008
IEEE
14 years 2 months ago
Retrieving relevant reports from a customer engagement repository
Customers of modern enterprise applications commonly engage the vendor of the application for onsite troubleshooting and fine tuning of large deployments. The results of these eng...
Dharmesh Thakkar, Zhen Ming Jiang, Ahmed E. Hassan...