Sciweavers

2421 search results - page 91 / 485
» Message from the Co-Chairs
Sort
View
ATC
2007
Springer
14 years 2 months ago
Identity-Based Proxy Signature from Pairings
A proxy signature scheme allows an entity to delegate its signing capability to another entity (proxy) in such a way that the proxy can sign messages on behalf of the delegator. Pr...
Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xin...
EWCBR
2006
Springer
13 years 11 months ago
Case-Based Reasoning for Knowledge-Intensive Template Selection During Text Generation
The present paper describes a case-based reasoning solution for solving the task of selecting adequate templates for realizing messages describing actions in a given domain. This s...
Raquel Hervás, Pablo Gervás
USS
2008
13 years 10 months ago
Securing Frame Communication in Browsers
Many web sites embed third-party content in frames, relying on the browser's security policy to protect them from malicious content. Frames, however, are often insufficient i...
Adam Barth, Collin Jackson, John C. Mitchell
WSC
2008
13 years 10 months ago
Service-Oriented-Architecture based framework for multi-user virtual environments
Service-Oriented Architecture (SOA) is an application framework used for creating complex enterprise systems by integrating distributed services. The SOA standards are primarily f...
Xiaoyu Zhang, Denis Gracanin
MDM
2010
Springer
250views Communications» more  MDM 2010»
13 years 10 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...