Sciweavers

6137 search results - page 1000 / 1228
» Securing Collaborative Applications
Sort
View
AUSAI
2003
Springer
15 years 6 months ago
Decidability of Propositionally Quantified Logics of Knowledge
Abstract. Logics of knowledge have important applications for reasoning about security protocols and multi-agent systems. We extend the semantics for the logic of necessity with lo...
Tim French
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 5 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
MATA
2000
Springer
15 years 5 months ago
YAAP: Yet Another Active Platform
We present YAAP: a generic active network architecture with the ability to manually and dynamically deploy network services within distributed network nodes and providing a secure ...
Nicolas Rouhana, Samer Boustany, Eric Horlait
TSDM
2000
151views Data Mining» more  TSDM 2000»
15 years 5 months ago
Identifying Temporal Patterns for Characterization and Prediction of Financial Time Series Events
The novel Time Series Data Mining (TSDM) framework is applied to analyzing financial time series. The TSDM framework adapts and innovates data mining concepts to analyzing time ser...
Richard J. Povinelli
109
Voted
EUROCRYPT
1995
Springer
15 years 5 months ago
Verifiable Signature Sharing
Abstract. We introduce Verifiable Signature Sharing (VCS), a cryptographic primitive for protecting digital signatures. VCS enables the holder of a digitally signed document, who m...
Matthew K. Franklin, Michael K. Reiter
« Prev « First page 1000 / 1228 Last » Next »