Sciweavers

6137 search results - page 1006 / 1228
» Securing Collaborative Applications
Sort
View
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
15 years 2 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
CLEIEJ
2007
86views more  CLEIEJ 2007»
15 years 2 months ago
Requirements Game: Teaching Software Project Management
: Several business areas, like Management and Negotiation, have used games like a didactic way to simulate world reality, to introduce students to the day-to-day generated problems...
Carlos Mario Zapata Jaramillo, Gabriel Awad-Aubad
119
Voted
IJNSEC
2006
98views more  IJNSEC 2006»
15 years 2 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
110
Voted
IJSN
2006
96views more  IJSN 2006»
15 years 2 months ago
A new signature scheme without random oracles
In this paper, we propose a new signature scheme that is existentially unforgeable under a chosen message attack without random oracle. The security of our scheme depends on a new ...
Chik How Tan
SIGMETRICS
2008
ACM
130views Hardware» more  SIGMETRICS 2008»
15 years 2 months ago
Using probabilistic model checking in systems biology
Probabilistic model checking is a formal verification framework for systems which exhibit stochastic behaviour. It has been successfully applied to a wide range of domains, includ...
Marta Z. Kwiatkowska, Gethin Norman, David Parker
« Prev « First page 1006 / 1228 Last » Next »