Sciweavers

2702 search results - page 451 / 541
» Message from the Editor
Sort
View
137
Voted
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 3 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
DAM
2006
121views more  DAM 2006»
15 years 3 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
139
Voted
FGCS
2006
101views more  FGCS 2006»
15 years 3 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
131
Voted
GRID
2006
Springer
15 years 3 months ago
A Parallel Approach to XML Parsing
A language for semi-structured documents, XML has emerged as the core of the web services architecture, and is playing crucial roles in messaging systems, databases, and document p...
Wei Lu, Kenneth Chiu, Yinfei Pan
100
Voted
IEEEMM
2006
54views more  IEEEMM 2006»
15 years 3 months ago
MIDI to SP-MIDI Transcoding Using Phrase Stealing
The Musical Instrument Digital Interface (MIDI) is a popular music format used in mu ltimedia messaging service, such as mobile phone ringtones. Scalable Polyphony MIDI (SP-MIDI) ...
Simon Lui, Andrew Horner, Lydia Ayers