Sciweavers

6555 search results - page 1168 / 1311
» Secure attribute-based systems
Sort
View
104
Voted
CCS
2003
ACM
15 years 7 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
131
Voted
EUROCRYPT
2003
Springer
15 years 7 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
118
Voted
EDBTW
2010
Springer
15 years 7 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi
160
Voted
CSFW
2002
IEEE
15 years 7 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
141
Voted
AGENTS
2001
Springer
15 years 7 months ago
An assistive robotic agent for pedestrian mobility
The goal of this project is to develop a pedestrian mobility aid for the elderly. In order for this type of assistive technology to be useful and accepted by its intended user com...
Glenn S. Wasson, James P. Gunderson, Sean Graves, ...
« Prev « First page 1168 / 1311 Last » Next »