Sciweavers

12438 search results - page 2238 / 2488
» The Magic of a Number System
Sort
View
EUROCRYPT
2004
Springer
15 years 9 months ago
Traceable Signatures
Abstract. This work presents a new privacy primitive called “Traceable Signatures”, together with an efficient provably secure implementation. To this end, we develop the unde...
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung
LCTRTS
2004
Springer
15 years 9 months ago
Asynchronous software thread integration for efficient software
Existing software thread integration (STI) methods provide synchronous thread progress within integrated functions. For the remaining, non-integrated portions of the secondary (or...
Nagendra J. Kumar, Siddhartha Shivshankar, Alexand...
121
Voted
MIDDLEWARE
2004
Springer
15 years 9 months ago
PoliPer: policies for mobile and pervasive environments
The need for sharing is well known in a large number of distributed applications. These applications are difficult to develop either for fully wired or mobile wireless networks. ...
Luís Veiga, Paulo Ferreira
PPDP
2004
Springer
15 years 9 months ago
JIAD: a tool to infer design patterns in refactoring
Refactoring in object-orientation has gained increased attention due to its ability to improve design quality. Refactoring using design patterns (DPs) leads to production of high ...
J. Rajesh, D. Janakiram
RAID
2004
Springer
15 years 9 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
« Prev « First page 2238 / 2488 Last » Next »