Sciweavers

2478 search results - page 155 / 496
» Message from the Chair
Sort
View
JCP
2007
88views more  JCP 2007»
15 years 4 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
JOC
2007
129views more  JOC 2007»
15 years 4 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
JSAC
2007
87views more  JSAC 2007»
15 years 4 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
JSW
2007
126views more  JSW 2007»
15 years 4 months ago
Supporting UML Sequence Diagrams with a Processor Net Approach
— UML sequence diagrams focus on the interaction between different classes. For distributed real time transaction processing it is possible to end up with complex sequence diagra...
Tony Spiteri Staines
COLING
2002
15 years 4 months ago
Towards a Noise-Tolerant, Representation-Independent Mechanism for Argument Interpretation
We describe a mechanism for the interpretation of arguments, which can cope with noisy conditions in terms of wording, beliefs and argument structure. This is achieved through the...
Ingrid Zukerman, Sarah George