Sciweavers

1449 search results - page 75 / 290
» Secure and Efficient Metering
Sort
View
APNOMS
2006
Springer
13 years 11 months ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
ICISC
2001
98views Cryptology» more  ICISC 2001»
13 years 9 months ago
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
In this paper, we propose a multi-signature scheme, in which each signer can express her intention associating with the message to be signed. Signers' intentions mean a kind o...
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsu...
ICSAP
2009
13 years 5 months ago
Omnidirectional Surveillance System for Digital Home Security
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porc...
Wai Kit Wong, Joanne Tze Yen Liew, Chu Kiong Loo, ...
CSREAEEE
2006
149views Business» more  CSREAEEE 2006»
13 years 9 months ago
ALE Application Framework for Constructing Effective RFID Application
- RFID technology could greatly improve the business efficiency. EPCglobal Network suggests a kind of interface, called ALE (Application Level Events), for an efficient RFID develo...
Kyuhee An, Mokdong Chung
CCS
2008
ACM
13 years 9 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim