Sciweavers

623 search results - page 98 / 125
» A proposal for Ontology Security Standards
Sort
View
CORR
2009
Springer
95views Education» more  CORR 2009»
13 years 5 months ago
Execution Models for Choreographies and Cryptoprotocols
A choreography describes a transaction in which several principals interact. Since choreographies frequently describe business processes affecting substantial assets, we need a se...
Marco Carbone, Joshua D. Guttman
ICUMT
2009
13 years 5 months ago
Extending middleware frameworks for Wireless Sensor Networks
We define sensor middleware as the binding code mainly running between the sensor OS and applications g programming abstractions to bridge the gap between application developers an...
Syed Rehan Afzal, Christophe Huygens, Wouter Joose...
IJACTAICIT
2010
189views more  IJACTAICIT 2010»
13 years 5 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
35
Voted
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 2 months ago
Key Reduction of McEliece's Cryptosystem Using List Decoding
Different variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door t...
Morgan Barbier
JOC
2011
102views more  JOC 2011»
13 years 2 months ago
Wildcarded Identity-Based Encryption
In this paper we introduce a new primitive called identity-based encryption with wildcards, or WIBE for short. It allows a sender to encrypt messages to a whole range of receivers ...
Michel Abdalla, James Birkett, Dario Catalano, Ale...