Sciweavers

1834 search results - page 325 / 367
» Public Key Cryptography
Sort
View
JCM
2007
191views more  JCM 2007»
13 years 7 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
JCST
2007
98views more  JCST 2007»
13 years 7 months ago
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004
Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group. In the case of later dispute, a designated group manager can revoke the anony...
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
COMPSEC
2004
104views more  COMPSEC 2004»
13 years 7 months ago
Formal support for certificate management policies
Traditionally, creation and revocation of certificates are governed by policies that are carried manually, off-line, by trusted agents. This approach to certificate management is ...
Victoria Ungureanu
CSCW
2004
ACM
13 years 7 months ago
Building Connections among Loosely Coupled Groups: Hebb's Rule at Work
Awareness of others' interests can lead to fruitful collaborations, friendships and positive social change. Interviews of groups involved in both research and corporate work r...
Scott Carter, Jennifer Mankoff, P. Goddi
CAI
2002
Springer
13 years 7 months ago
A Revised Analysis of the Open Grid Services Infrastructure
This paper began its life as an unpublished technical review [20] of the proposed Open Grid Services Architecture (OGSA) as described in the papers, "The Physiology of the Gr...
Dennis Gannon, Kenneth Chiu, Madhusudhan Govindara...