Sciweavers

549 search results - page 99 / 110
» On the Reading of Tables of Contents
Sort
View
FSTTCS
2003
Springer
14 years 26 days ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
GCC
2003
Springer
14 years 26 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
SEMWEB
2001
Springer
14 years 2 days ago
Conceptual Open Hypermedia = The Semantic Web?
The Semantic Web is still a web, a collection of linked nodes. Navigation of links is currently, and will remain for humans if not machines, a key mechanism for exploring the spac...
Carole A. Goble, Sean Bechhofer, Les Carr, David D...
MSS
2000
IEEE
182views Hardware» more  MSS 2000»
14 years 1 days ago
A Blueprint for Representation Information in the OAIS Model
The CEDARS∗ project within UK academia seeks to develop a demonstrator system to recommend techniques for long-term storage of digital data primarily within the research library...
David Holdsworth, Derek M. Sergeant
ACMACE
2008
ACM
13 years 9 months ago
When RFIDs meet artist's painting
This work challenges the conventional art experience. It brings together the fields of art, science, and software integration. The goal was to create a new kind of painting based ...
Olivier Haberman, Romain Pellerin, Ugo Haberman