Sciweavers

623 search results - page 89 / 125
» A proposal for Ontology Security Standards
Sort
View
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 3 months ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 10 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
SCN
2010
Springer
147views Communications» more  SCN 2010»
13 years 7 months ago
Group Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the si...
Bartosz Przydatek, Douglas Wikström
AH
2008
Springer
14 years 3 months ago
A Dynamic Content Generator for Adaptation in Hypermedia Systems
The heterogeneity problem (in terms of different types of access devices, network bandwidth, preferences/characteristics of the user, etc.) has become a major problem for the Inter...
David Mérida, Ramón Fabregat, Xavier...
CSMR
2007
IEEE
14 years 3 months ago
The Reality of Libraries
Libraries provide implementation for the concepts of a particular domain. When programmers use a library, they do not work any more with the real-world concepts but with their imp...
Daniel Ratiu, Jan Jürjens