Sciweavers

1834 search results - page 301 / 367
» Public Key Cryptography
Sort
View
MOBIHOC
2007
ACM
14 years 7 months ago
Secure incentives for commercial ad dissemination in vehicular networks
Vehicular ad hoc networks (VANETs) are envisioned to provide us with numerous interesting services in the near future. One of the most promising applications is the dissemination ...
Suk-Bok Lee, Gabriel Pan, Joon-Sang Park, Mario Ge...
IEEEARES
2010
IEEE
14 years 2 months ago
Solving the Transitive Access Problem for the Services Oriented Architecture
: © Solving the Transitive Access Problem for the Services Oriented Architecture Alan H. Karp, Jun Li HP Laboratories HPL-2008-204R1 SOA, web services, access control, RBAC, PBAC,...
Alan H. Karp, Jun Li
HICSS
2009
IEEE
215views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Real World Perspective: Employee Perspectives of Employer Sponsored Personal Health Record (PHR) Systems
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
14 years 2 months ago
Digital Cross-Organizational and Cross-Border Collaboration: A Scientometric Study
Digital cross-organizational and cross-border collaboration are emerging research issues. Significant drivers of this development are collaboration-related information systems. A ...
Maria Madlberger, Narcyz Roztocki
FOCS
2009
IEEE
14 years 2 months ago
Bit Encryption Is Complete
Abstract— Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, howe...
Steven Myers, Abhi Shelat