Sciweavers

985 search results - page 60 / 197
» On the validity of digital signatures
Sort
View
SIP
2007
13 years 10 months ago
Geometrically robust image watermarking using star patterns
Digital copyright protection has become increasingly important in recent times due to the rapid growth of the Internet and the proliferation of P2P technologies. Copyright protect...
J. R. Zhang, Jon G. Rokne
ECAI
2000
Springer
14 years 1 months ago
Enriching very large ontologies using the WWW
This paper explores the possibility to exploit text on the world wide web in order to enrich the concepts in existing ontologies. First, a method to retrieve documents from the WWW...
Eneko Agirre, Olatz Ansa, Eduard H. Hovy, David Ma...
IEEEARES
2008
IEEE
14 years 3 months ago
Matching Policies with Security Claims of Mobile Applications
The Security-by-Contract (S×C) framework has been recently proposed to address the trust relationship problem of the current security model adopted for mobile devices. The key id...
Nataliia Bielova, Marco Dalla Torre, Nicola Dragon...
INFOCOM
1998
IEEE
14 years 1 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
ECIS
2001
13 years 10 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke