Sciweavers

905 search results - page 101 / 181
» Public key distribution through
Sort
View
ESCIENCE
2006
IEEE
14 years 18 days ago
A Unified Model of Batch and Interactive Scientific Workflow and Its Implementation Using Windows Workflow
Workflow is a key technology for eScience. It enables scientific tools to be composed and the resulting workflows to be managed. Workflow and most other computing tools typically ...
Asbjørn Rygg, Jiro Sumitomo, Paul Roe
STOC
2005
ACM
93views Algorithms» more  STOC 2005»
14 years 9 months ago
Representing hard lattices with O(n log n) bits
We present a variant of the Ajtai-Dwork public-key cryptosystem where the size of the public-key is only O(n log n) bits and the encrypted text/clear text ratio is also O(n log n)...
Miklós Ajtai
HICSS
2009
IEEE
215views Biometrics» more  HICSS 2009»
14 years 3 months ago
A Real World Perspective: Employee Perspectives of Employer Sponsored Personal Health Record (PHR) Systems
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu
ICB
2009
Springer
202views Biometrics» more  ICB 2009»
14 years 3 months ago
Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features
Abstract. Fingerprints are considered to be unique because they contain various distinctive features, including minutiae, ridges, pores, etc. Some attempts have been made to model ...
Yi Chen, Anil K. Jain
SC
2005
ACM
14 years 2 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain