Sciweavers

1834 search results - page 323 / 367
» Public Key Cryptography
Sort
View
JNCA
2008
104views more  JNCA 2008»
13 years 7 months ago
Computing in social networks with relationship algebra
Communities are the latest phenomena on the Internet. At the heart of each community lies a social network. In this paper, we show a generalized framework to understand and reason...
Javed I. Khan, Sajid S. Shaikh
JOI
2008
129views more  JOI 2008»
13 years 7 months ago
Global scientific production on GIS research by bibliometric analysis from 1997 to 2006
A bibliometric analysis was applied in this work to evaluate global scientific production of geographic information system (GIS) papers from 1997 to 2006 in any journal of all the...
Yangge Tian, Cheng Wen, Song Hong
JCP
2006
116views more  JCP 2006»
13 years 7 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...
JUCS
2008
119views more  JUCS 2008»
13 years 7 months ago
A Standards-based Modelling Approach for Dynamic Generation of Adaptive Learning Scenarios
: One of the key problems in developing standard based adaptive courses is the complexity involved in the design phase, especially when establishing the hooks for the dynamic model...
Jesus Boticario, Olga C. Santos
JMM2
2006
133views more  JMM2 2006»
13 years 7 months ago
An Adaptive Method for Image Recovery in the DFT Domain
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Peining Tao, Ahmet M. Eskicioglu