Sciweavers

985 search results - page 107 / 197
» On the validity of digital signatures
Sort
View
GCC
2003
Springer
14 years 3 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
MOBICOM
2010
ACM
13 years 10 months ago
CSMA/CN: carrier sense multiple access with collision notification
A wireless transmitter learns of a packet loss, infers collision, only after completing the entire transmission. If the transmitter could detect the collision early (such as with ...
Souvik Sen, Romit Roy Choudhury, Srihari Nelakudit...
IWVF
2001
Springer
14 years 2 months ago
Minimum-Length Polygons in Approximation Sausages
The paper introduces a new approximation scheme for planar digital curves. This scheme defines an approximating sausage ‘around’ the given digital curve, and calculates a mini...
Tetsuo Asano, Yasuyuki Kawamura, Reinhard Klette, ...
DL
1997
Springer
14 years 2 months ago
Shopping Models: A Flexible Architecture for Information Commerce
In a digital library, there are many di erent interaction models between customers and information providers or merchants. Subscriptions, sessions, pay-per-view, shareware, and pr...
Steven P. Ketchpel, Hector Garcia-Molina, Andreas ...
SADFE
2008
IEEE
14 years 4 months ago
Exemplifying Attack Identification and Analysis in a Novel Forensically Viable Syslog Model
This research builds on our method for validating syslog entries proposed in [5]. The goal of the proposed method is to allow syslog files to be forensically viable. The goal with...
Steena Dominica Steven Monteiro, Robert F. Erbache...