Sciweavers

1834 search results - page 261 / 367
» Public Key Cryptography
Sort
View
HICSS
2006
IEEE
170views Biometrics» more  HICSS 2006»
14 years 1 months ago
A Complex Adaptive System Perspective of Enterprise Architecture in Electronic Government
Within the public sector, the deployment of enterprise architecture is often an attempt to address the decentralization/centralization relationships to improve the links between t...
Marijn Janssen, George Kuk
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
14 years 1 months ago
Explaining ICT Infrastructure and E-Commerce Uses and Benefits in Industrial Clusters: Evidence from a Biotech Cluster
The literature on industrial clusters has not focused heavily on the role of the ICT infrastructure, nor on the potential implications of electronic commerce . In this paper, we e...
Charles Steinfield, Ada Scupola
AVSS
2005
IEEE
14 years 1 months ago
Shape recognition based on a video and multi-sensor system
We present in this paper a real-time system for shape recognition. The proposed system is a video and multisensor platform that is able to classify the mobile objects evolving in ...
Huy-Binh Bui Ngoc, François Brémond,...
ICECCS
2005
IEEE
108views Hardware» more  ICECCS 2005»
14 years 1 months ago
Evolving Messaging Systems for Secure Role Based Messaging
This paper articulates a system design for the secure role based messaging model built based on existing messaging systems, public key infrastructures, and a privilege management ...
Gansen Zhao, David W. Chadwick
AINA
2003
IEEE
14 years 1 months ago
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements
The multiplications of common multiplicands and exponentiations of large integers with a large modulus are the primary computation operations in several well-known public key cryp...
Chin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin