Sciweavers

766 search results - page 53 / 154
» How to Read a Signature
Sort
View
JNW
2008
103views more  JNW 2008»
13 years 9 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
ENTCS
2007
96views more  ENTCS 2007»
13 years 9 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...
CORR
2004
Springer
97views Education» more  CORR 2004»
13 years 8 months ago
Planning for Directory Services in Public Key Infrastructures
: In this paper we provide a guide for public key infrastructure designers and administrators when planning for directory services. We concentrate on the LDAP directories and how t...
Vangelis Karatsiolis, Marcus Lippert, Alexander Wi...
MOBISYS
2007
ACM
14 years 8 months ago
MyExperience: a system for in situ tracing and capturing of user feedback on mobile phones
This paper presents MyExperience, a system for capturing both objective and subjective in situ data on mobile computing activities. MyExperience combines the following two techniq...
Jon Froehlich, Mike Y. Chen, Sunny Consolvo, Bever...
CSCW
2004
ACM
14 years 2 months ago
Group awareness in distributed software development
Open-source software development projects are almost always collaborative and distributed. Despite the difficulties imposed by distance, these projects have managed to produce lar...
Carl Gutwin, Reagan Penner, Kevin A. Schneider