Sciweavers

1834 search results - page 324 / 367
» Public Key Cryptography
Sort
View
PERVASIVE
2006
Springer
13 years 7 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
SIGKDD
2008
87views more  SIGKDD 2008»
13 years 7 months ago
Blogosphere: research issues, tools, and applications
Weblogs, or Blogs, have facilitated people to express their thoughts, voice their opinions, and share their experiences and ideas. Individuals experience a sense of community, a f...
Nitin Agarwal, Huan Liu
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 7 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 7 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
JCC
2007
80views more  JCC 2007»
13 years 7 months ago
In between worlds: G.N. Lewis, the shared pair bond and its multifarious contexts
: In this paper, I will look at the rather convoluted discovery process which gave birth to the concept of the shared electron pair bond as developed by G.N. Lewis, to be subsequen...
Ana Simões