Sciweavers

3086 search results - page 411 / 618
» Developing Secure Web Applications
Sort
View
ATC
2006
Springer
15 years 4 months ago
Managing Trust in Distributed Agent Systems
Abstract. Software agent technology has attracted much attention for developing various distributed systems, composed of autonomous agents interacting with one another using partic...
Stephen S. Yau
DIMEA
2008
137views Multimedia» more  DIMEA 2008»
15 years 4 months ago
Biometric tendency recognition and classification system: an artistic approach
The Biometric Tendency Recognition and Classification System is a software application that continuously measures a participant's physiological responses to a given image and...
Carlos Castellanos, Philippe Pasquier, Luther Thie...
FCS
2006
15 years 3 months ago
Quantum Cryptographic Key Distribution Protocols
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it i...
Lelde Lace, Oksana Scegulnaja-Dubrovska, Ramuns Us...
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 3 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
CDES
2009
87views Hardware» more  CDES 2009»
15 years 3 months ago
Delay-Insensitive Ternary Logic
This paper develops a delay-insensitive (DI) digital design paradigm that utilizes ternary logic as an alternative to dual-rail logic for encoding the DATA and NULL states. This ne...
Ravi Sankar Parameswaran Nair, Scott C. Smith, Jia...