Sciweavers

137 search results - page 14 / 28
» Verifiable Attribute Based Encryption
Sort
View
JCIT
2010
144views more  JCIT 2010»
13 years 2 months ago
A Model for Software Selection with Fuzzy Linguistic Information
With respect to multiple attribute decision making problem with triangular fuzzy linguistic information, in which the attribute weights and expert weights take the form of real nu...
Juchi Hou
DEXA
2000
Springer
76views Database» more  DEXA 2000»
14 years 6 days ago
Semantic Verification of Rule-Based Systems with Arithmetic Constraints
The aim of this paper is to show a method that is able to detect a particular class of semantic inconsistencies in a rule-based system (RBS). A semantic inconsistency is defined by...
Jaime Ramírez, Angélica de Antonio
CCS
2010
ACM
14 years 2 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
CIARP
2009
Springer
13 years 5 months ago
K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation
In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enr...
H. A. Garcia-Baleon, Vicente Alarcón Aquino...
SUTC
2010
IEEE
13 years 6 months ago
User-Based Attestation for Trustworthy Visual Sensor Networks
Abstract—Camera networks are used for a variety of applications including surveillance, traffic monitoring or elderly care. The shift from analog towards fully digitized systems...
Thomas Winkler, Bernhard Rinner