Sciweavers

3638 search results - page 22 / 728
» Distribution chain security
Sort
View
SECPERU
2006
IEEE
14 years 1 months ago
Using One-Way Chains to Provide Message Authentication without Shared Secrets
The objective of this paper is to propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret ...
Bogdan Groza
DASFAA
2006
IEEE
134views Database» more  DASFAA 2006»
14 years 1 months ago
Authentication of Outsourced Databases Using Signature Aggregation and Chaining
Database outsourcing is an important emerging trend which involves data owners delegating their data management needs to an external service provider. Since a service provider is a...
Maithili Narasimha, Gene Tsudik
IEEEARES
2007
IEEE
14 years 2 months ago
CASSIS - Computer-based Academy for Security and Safety in Information Systems
Information technologies and society are highly interwoven nowadays, but in both, the private and business sector, users are often not aware of security issues or lack proper secu...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...
JTAER
2008
116views more  JTAER 2008»
13 years 7 months ago
Disruptions in Information Flow: A Revenue Costing Supply Chain Dilemma
The integration of supply chains as a mechanism for value creation is largely dependent on continuous flow of real time accurate information from the customer back upstream to the...
Albert Munoz, Michael D. Clements
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
14 years 1 months ago
On the stationary distribution of GAs with fixed crossover probability
We analyse the convergence of a GA when the mutation probability is low and the selection pressure is high, for arbitrary crossover types and probabilities. We succeed in mathemat...
U. Chandimal de Silva, Joe Suzuki