Sciweavers

1282 search results - page 203 / 257
» Signing on signing off
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
14 years 2 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
ACNS
2004
Springer
167views Cryptology» more  ACNS 2004»
14 years 1 months ago
A Fully-Functional Group Signature Scheme over Only Known-Order Group
The concept of group signature allows a group member to sign message anonymously on behalf of the group. In the event of a dispute, a designated entity can reveal the identity of a...
Atsuko Miyaji, Kozue Umeda
CAISE
2006
Springer
14 years 1 months ago
On Controlled Flexibility
Striking a balance between rigidity and flexibility is a central challenge in designing business processes. Striking this balance begins on the type level, because expressiveness ...
Signe Ellegård Borch, Christian Stefansen
CCS
2006
ACM
14 years 1 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
CCS
2006
ACM
14 years 1 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven