Sciweavers

19003 search results - page 93 / 3801
» We Need Assurance!
Sort
View
CSR
2006
Springer
13 years 11 months ago
Logic of Proofs for Bounded Arithmetic
The logic of proofs is known to be complete for the semantics of proofs in PA. In this paper we present a refinement of this theorem, we will show that we can assure that all the ...
Evan Goris
ELPUB
2006
ACM
14 years 1 months ago
Electronic Publishing of Digitised Works
This paper describes the automated process to create structured master and access copies for the digitised works at the BND – National Digital Library. The BND created during 20...
João Penas, João Gil, Gilberto Pedro...
ESORICS
2004
Springer
14 years 1 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
JNW
2008
83views more  JNW 2008»
13 years 7 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
IDTRUST
2009
ACM
14 years 2 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta