Sciweavers

1855 search results - page 350 / 371
» System Consequence
Sort
View
EGOV
2005
Springer
14 years 3 months ago
An Infrastructural Approach to Secure Interoperability of Electronic IDs: The Bridging Backbone
In this paper we propose a solution to secure interoperability between electronic ID management infrastructures enabling the provision of cross-border eServices to mobile citizens....
Franco Arcieri, Andrea Dimitri, Fabio Fioravanti, ...
OTM
2005
Springer
14 years 3 months ago
GeRoMe: A Generic Role Based Metamodel for Model Management
Abstract. The goal of Model Management is the development of new technologies and mechanisms to support the integration, evolution and matching of models. Such tasks are to be perf...
David Kensche, Christoph Quix, Mohamed Amine Chatt...
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
SASN
2004
ACM
14 years 3 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
SPAA
2004
ACM
14 years 3 months ago
Lower bounds for graph embeddings and combinatorial preconditioners
Given a general graph G, a fundamental problem is to find a spanning tree H that best approximates G by some measure. Often this measure is some combination of the congestion and...
Gary L. Miller, Peter C. Richter