Sciweavers

1610 search results - page 272 / 322
» Identity Based Multisignatures
Sort
View
DC
2006
13 years 9 months ago
Dynamic group communication
Group communication is the basic infrastructure for implementing fault-tolerant replicated servers. While group communication is well understood in the context of static systems (...
André Schiper
EG
2006
96views more  EG 2006»
13 years 9 months ago
Building Semantic Webs for e-government with Wiki technology
: E-government webs are among the largest webs in existence, based on the size, number of users and number of information providers. Thus, creating a Semantic Web infrastructure to...
Christian Wagner, Karen S. K. Cheung, Rachael Kwai...
FSS
2006
85views more  FSS 2006»
13 years 9 months ago
The logic of tied implications, part 2: Syntax
An implication operator A is said to be tied if there is a binary operation T that ties A; that is, the identity A(a, A(b, z)) = A(T (a, b), z) holds for all a, b, z. We aim at th...
Nehad N. Morsi, Wafik Boulos Lotfallah, Moataz Sal...
IJNSEC
2008
88views more  IJNSEC 2008»
13 years 9 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
GRID
2006
Springer
13 years 9 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...