Sciweavers

1323 search results - page 200 / 265
» Updatable Security Views
Sort
View
CSFW
2006
IEEE
15 years 8 months ago
Resolve-Impossibility for a Contract-Signing Protocol
Abstract. A multi-party contract signing protocol allows a set of participants to exchange messages with each other with a view to arriving in a state in which each of them has a p...
Aybek Mukhamedov, Mark Dermot Ryan
102
Voted
NOMS
2006
IEEE
15 years 8 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
111
Voted
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 8 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
ICDCSW
2005
IEEE
15 years 8 months ago
Integrating Databases with Publish/Subscribe
Publish/subscribe is emerging as an appropriate communication paradigm for large-scale, widely-distributed systems. In this paper, we describe our work on integrating active datab...
Luis Vargas, Jean Bacon, Ken Moody
119
Voted
ACNS
2005
Springer
167views Cryptology» more  ACNS 2005»
15 years 8 months ago
Identity Based Encryption Without Redundancy
This paper presents a first example of secure identity based encryption scheme (IBE) without redundancy in the sense of Phan and Pointcheval. This modification of the Boneh-Frank...
Benoît Libert, Jean-Jacques Quisquater