Sciweavers

1120 search results - page 110 / 224
» Trust in Electronic Environments
Sort
View
ADHOC
2008
118views more  ADHOC 2008»
13 years 10 months ago
A localized certificate revocation scheme for mobile ad hoc networks
The issue of certificate revocation in mobile ad hoc networks (MANETs) where there are no on-line access to trusted authorities, is a challenging problem. In wired network environ...
Geneviève Arboit, Claude Crépeau, Ca...
JCP
2007
88views more  JCP 2007»
13 years 10 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet
WWW
2006
ACM
14 years 11 months ago
Adding semantics to rosettaNet specifications
The use of Semantic Web Service (SWS) technologies have been suggested to enable more dynamic B2B integration of heterogeneous systems and partners. We present how we add semantic...
Paavo Kotinurmi, Tomas Vitvar
SWAP
2007
13 years 11 months ago
The JUMP project: Domain Ontologies and Linguistic Knowledge @ Work
The JUMP project aims at bringing together the knowledge stored in different information systems in order to satisfy information and training needs in knowledge-intensive organisa...
Pierpaolo Basile, Marco Degemmis, Anna Lisa Gentil...
INTERNET
2006
157views more  INTERNET 2006»
13 years 10 months ago
Distributed Data Mining in Peer-to-Peer Networks
Distributed data mining deals with the problem of data analysis in environments with distributed data, computing nodes, and users. Peer-to-peer computing is emerging as a new dist...
Souptik Datta, Kanishka Bhaduri, Chris Giannella, ...