Sciweavers

811 search results - page 102 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
SRDS
2010
IEEE
13 years 6 months ago
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Entities (e.g., users, services) have to authenticate themselves to service providers (SPs) in order to use their services. An entity provides personally identifiable information (...
Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, No...
IDMS
1997
Springer
188views Multimedia» more  IDMS 1997»
14 years 13 days ago
An Approach for an Adaptive Visualization in a Mobile Environment
With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
Luc Neumann, Alberto Barbosa Raposo
CGF
2004
173views more  CGF 2004»
13 years 8 months ago
Simulating and Modeling Lichen Growth
This paper presents a system for modeling lichens and simulating their propagation and growth in a virtual scene. Lichens colonize almost every substrate in nature and play an imp...
Brett Desbenoit, Eric Galin, Samir Akkouche
IACR
2011
147views more  IACR 2011»
12 years 8 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
CSFW
2007
IEEE
14 years 3 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...