Sciweavers

5488 search results - page 1023 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
EUROCRYPT
2004
Springer
15 years 9 months ago
Projective Coordinates Leak
Denoting by P = [k]G the elliptic-curve double-and-add multiplication of a public base point G by a secret k, we show that allowing an adversary access to the projective representa...
David Naccache, Nigel P. Smart, Jacques Stern
EUROPAR
2004
Springer
15 years 9 months ago
Databases, Workflows and the Grid in a Service Oriented Environment
As the Grid moves towards adopting a service-oriented architecture built on Web services, coupling between processes will rely on secure, reliable, and transacted messages and be s...
Zhuoan Jiao, Jasmin L. Wason, Wenbin Song, Fenglia...
HSNMC
2004
Springer
165views Multimedia» more  HSNMC 2004»
15 years 9 months ago
An Architecture for User Location in Heterogeneous Mobile Networks
Fourth generation mobile networks will allow end-users to roam over different network technologies, such as UMTS, CDMA2000 and Wi-Fi. These mobile networks make it possible to dete...
Maarten Wegdam, Jeroen van Bemmel, Ko Lagerberg, P...
ICCS
2004
Springer
15 years 9 months ago
Demonstrating Wireless IPv6 Access to a Federated Health Record Server
: This paper describes the practical implementation of a federated health record server based on a generic and comprehensive architecture, deployed in a live clinical setting and a...
Dipak Kalra, David Ingram, A. Austin, V. Griffith,...
OOPSLA
2004
Springer
15 years 9 months ago
Example centric programming
Programmers tend to understand programs by thinking of concrete examples. Example Centric Programming seeks to add IDE support for examples throughout the process of programming. ...
Jonathan Edwards
« Prev « First page 1023 / 1098 Last » Next »