Sciweavers

2184 search results - page 352 / 437
» Modeling and Realizing Interoperability
Sort
View
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
14 years 4 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
SAC
2010
ACM
14 years 2 months ago
Towards mobile process as a service
Process as a Service (PaaS) addresses modeling, execution and management of business processes without running extensive and costly process management software. Such a flexible o...
Sonja Zaplata, Winfried Lamersdorf
HICSS
2009
IEEE
146views Biometrics» more  HICSS 2009»
14 years 2 months ago
Open Access to Scientific Literature - Increasing Citations as an Incentive for Authors to Make Their Publications Freely Access
In recent years the scientific journal market faces significant evolutions that may cause major changes in the way of publishing research results. In this connection, open access ...
Steffen Bernius, Matthias Hanauske
ISQED
2009
IEEE
117views Hardware» more  ISQED 2009»
14 years 2 months ago
Adaptive voltage controlled nanoelectronic addressing for yield, accuracy and resolution
An outstanding challenge for realizing nanoelectronic systems is nano-interface design, i.e., how to precisely access a nanoscale wire in an array for communication between a nano...
Bao Liu
CCS
2009
ACM
14 years 2 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal