Sciweavers

211 search results - page 14 / 43
» Secrecy and Group Creation
Sort
View
IFIP
2009
Springer
13 years 6 months ago
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers achieve greater security. Proof of possession of authorisation values known as authdata is require...
Liqun Chen, Mark Ryan
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 3 months ago
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Ratna Dutta, Yong Dong Wu, Sourav Mukhopadhyay
CDVE
2009
Springer
14 years 3 months ago
DooSo6: Easy Collaboration over Shared Projects
Abstract. Existing tools for supporting parallel work feature some disadvantages that prevent them to be widely used. Very often they require a complex installation and creation of...
Claudia-Lavinia Ignat, Gérald Oster, Pascal...
IHM
2009
ACM
14 years 3 months ago
Une interface de programmation visuelle pour la composition de services de visualisation d'information
In this article, we are interested in information visualisations creation and sharing. Our approach is to consider information visualisation as a dataflow, issued from web servic...
Romain Vuillemot, Béatrice Rumpler
HICSS
2005
IEEE
114views Biometrics» more  HICSS 2005»
14 years 2 months ago
Boundary-Spanning Knowledge-Sharing In E-Collaboration
Knowledge creation and sharing in organizations is most often assumed to involve direct interactions. It is true that the creation of shared knowledge is really only feasible when...
Susan Gasson