Sciweavers

109 search results - page 16 / 22
» Identity Based Undeniable Signatures
Sort
View
CCS
2010
ACM
14 years 3 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
ECIS
2001
13 years 10 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
ICB
2007
Springer
104views Biometrics» more  ICB 2007»
14 years 2 months ago
Repudiation Detection in Handwritten Documents
The problems that arise in forensic document examination, are usually quite different from that of traditional writer identification and verification tasks, where the data is ass...
Sachin Gupta, Anoop M. Namboodiri
CORR
2007
Springer
94views Education» more  CORR 2007»
13 years 8 months ago
Neighbor Discovery in Wireless Networks:A Multiuser-Detection Approach
— We examine the problem of determining which nodes are neighbors of a given one in a wireless network. We consider an unsupervised network operating on a frequencyflat Gaussian...
Daniele Angelosante, Ezio Biglieri, Marco Lops
ICCSA
2005
Springer
14 years 2 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das