Sciweavers

464 search results - page 59 / 93
» Identity Management
Sort
View
ICSNC
2007
IEEE
14 years 2 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
JTAER
2008
82views more  JTAER 2008»
13 years 7 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
ICEIS
2008
IEEE
14 years 2 months ago
Hippocratic Multi-Agent Systems
The current evolution of Information Technology leads to the increase of automatic data processing over multiple information systems. The data we deal with concerns sensitive infor...
Ludivine Crépin, Laurent Vercouter, Olivier...
P2P
2005
IEEE
112views Communications» more  P2P 2005»
14 years 1 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
ER
2005
Springer
134views Database» more  ER 2005»
14 years 1 months ago
An Agent-Oriented Meta-model for Enterprise Modelling
This paper proposes an agent-oriented meta-model that provides rigorous concepts for conducting enterprise modelling. The aim is to allow analysts to produce an enterprise model th...
Ivan Jureta, Stéphane Faulkner