Sciweavers

985 search results - page 104 / 197
» On the validity of digital signatures
Sort
View
CAISE
2003
Springer
14 years 3 months ago
Virtual Communities: Analysis and Design Support
Abstract. Information systems engineering for design or knowledge communities is characterized by the fact that these communities constantly monitor themselves and initiate repair ...
Ralf Klamma, Marc Spaniol, Matthias Jarke
CCS
2010
ACM
14 years 5 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
IRI
2008
IEEE
14 years 4 months ago
Modeling and synthesis of service composition using tree automata
— We revisit the problem of synthesis of service composition in the context of service oriented architecture from a tree automata perspective. Comparing to existing finite state...
Ken Q. Pu, Ying Zhu
CSFW
2007
IEEE
14 years 4 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
ICMCS
2006
IEEE
99views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Counting of Video Clip Repetitions using a Modified BMH Algorithm: Preliminary Results
In this work, we cope with the problem of identifying the number of repetitions of a specific video clip in a target video clip. Generally, the methods that deal with this proble...
Silvio Jamil Ferzoli Guimarães, Renata Rodr...