Sciweavers

1834 search results - page 336 / 367
» Public Key Cryptography
Sort
View
ICICS
2003
Springer
14 years 27 days ago
ID-Based Distributed "Magic Ink" Signature from Pairings
The advantage of ID-based system is the simplification of key distribution and certification management; a user can directly use his identity as his public key instead of an arbi...
Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
COSIT
2001
Springer
139views GIS» more  COSIT 2001»
14 years 5 days ago
Two Path Prepositions: Along and Past
Abstract. We present results from a series of experiments, where relevant factors for the use of path prepositions were examined. We were especially interested in the concepts behi...
Christian Kray, Jörg Baus, Hubert D. Zimmer, ...
VLDB
2001
ACM
82views Database» more  VLDB 2001»
14 years 3 days ago
Supporting Incremental Join Queries on Ranked Inputs
This paper investigates the problem of incremental joins of multiple ranked data sets when the join condition is a list of arbitrary user-defined predicates on the input tuples. ...
Apostol Natsev, Yuan-Chi Chang, John R. Smith, Chu...
ECIS
2004
13 years 9 months ago
Measuring enterprise systems success: the importance of a multiple stakeholder perspective
: Organisations invest enormous amount of resources in acquiring Enterprise Systems (ES), presumably expecting positive impacts to the organisation and its functions. Despite the o...
Darshana Sedera, Guy G. Gable, Taizan Chan
CCS
2010
ACM
13 years 7 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu