Sciweavers

1610 search results - page 266 / 322
» Identity Based Multisignatures
Sort
View
ISSA
2008
13 years 11 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
ICWS
2007
IEEE
13 years 11 months ago
A Semantic Framework for Identifying Events in a Service Oriented Architecture
We propose a semantic framework for automatically identifying events as a step towards developing an adaptive middleware for Service Oriented Architecture (SOA). Current related r...
Karthik Gomadam, Ajith Ranabahu, Lakshmish Ramaswa...
LREC
2008
88views Education» more  LREC 2008»
13 years 11 months ago
An Infrastructure, Tools and Methodology for Evaluation of Multicultural Name Matching Systems
This paper describes a Name Matching Evaluation Laboratory that is a joint effort across multiple projects. The lab houses our evaluation infrastructure as well as multiple name m...
Keith J. Miller, Mark Arehart, Catherine Ball, Joh...
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 11 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
ICIS
2001
13 years 11 months ago
Brand Awareness and Price Dispersion in Electronic Markets
Price dispersion, the variance in price for identical products across retailers, is a persistent feature of Internetbased markets, even those mediated by shopping agents (shopbots...
Pei-Yu Sharon Chen, Lorin M. Hitt