Sciweavers

2376 search results - page 349 / 476
» CM - Configuration Change Management
Sort
View
ASIACRYPT
2005
Springer
14 years 2 months ago
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, H...
BPM
2005
Springer
85views Business» more  BPM 2005»
14 years 2 months ago
IT Support for Healthcare Processes
Healthcare processes require the cooperation of different organizational units and medical disciplines. In such an environment optimal process support becomes crucial. Though hea...
Richard Lenz, Manfred Reichert
BTW
2005
Springer
107views Database» more  BTW 2005»
14 years 2 months ago
DBMS Architecture - Still an Open Problem
More than two decades ago, DB researchers faced up to the question of how to design a data-independent database management system (DBMS), that is, a DBMS which offers an appropriat...
Theo Härder
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
14 years 2 months ago
Security Limits for Compromising Emanations
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanat...
Markus G. Kuhn
CLEF
2005
Springer
14 years 2 months ago
Exploiting Linguistic Indices and Syntactic Structures for Multilingual Question Answering: ITC-irst at CLEF 2005
This year we participated at 4 Question Answering tasks at CLEF: the Italian monolingual (I), Italian-English (I/E), Bulgarian monolingual (B), and Bulgarian-English (B/E) bilingu...
Hristo Tanev, Milen Kouylekov, Bernardo Magnini, M...