Sciweavers

963 search results - page 94 / 193
» Conditional Digital Signatures
Sort
View
GCC
2003
Springer
14 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
MOBICOM
2010
ACM
13 years 10 months ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
INFOCOM
2011
IEEE
13 years 1 months ago
Distinguishing locations across perimeters using wireless link measurements
—Perimeter distinction in a wireless network is the ability to distinguish locations belonging to different perimeters. It is complementary to existing localization techniques. A...
Junxing Zhang, Sneha Kumar Kasera, Neal Patwari, P...
DGCI
2006
Springer
14 years 1 months ago
Topologically Correct Image Segmentation Using Alpha Shapes
Abstract. Existing theories on shape digitization impose strong constraints on feasible shapes and require error-free measurements. We use Delaunay triangulation and -shapes to pro...
Peer Stelldinger, Ullrich Köthe, Hans Meine
DAC
2002
ACM
14 years 11 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...