Sciweavers

1834 search results - page 320 / 367
» Public Key Cryptography
Sort
View
IMSA
2001
143views Multimedia» more  IMSA 2001»
13 years 9 months ago
A Collaborative Electronic Laboratory Notebook
We have developed a secure, collaborative, web-based electronic notebook (EN) designed to provide researchers and students with a means to record and share their primary research ...
James D. Myers, Elena S. Mendoza, B. Hoopes
SSWMC
2004
13 years 9 months ago
Multimedia document authentication using on-line signatures as watermarks
Authentication of digital documents is an important concern as digital documents are replacing the traditional paper-based documents for official and legal purposes. This is espec...
Anoop M. Namboodiri, Anil K. Jain
ISCAPDCS
2003
13 years 9 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
MMNS
2003
69views Multimedia» more  MMNS 2003»
13 years 9 months ago
Authentication Issues in Multi-service Residential Access Networks
Abstract. Multi-service residential access networks allow residential customers to choose amongst a variety of service offerings, over a range of Core Networks and subject to user...
Judith E. Y. Rossebø, John Ronan, Kristian ...
ATMOS
2009
13 years 8 months ago
Delay Management with Re-Routing of Passengers
Trains often arrive delayed at stations where passengers have to change to other trains. The question of delay management is whether these trains should wait for the original train...
Twan Dollevoet, Dennis Huisman, Marie Schmidt, Ani...