Sciweavers

9 search results - page 2 / 2
» An object oriented approach to an identity based encryption ...
Sort
View
CCS
2008
ACM
13 years 7 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
ICWS
2007
IEEE
13 years 6 months ago
A Semantic Framework for Identifying Events in a Service Oriented Architecture
We propose a semantic framework for automatically identifying events as a step towards developing an adaptive middleware for Service Oriented Architecture (SOA). Current related r...
Karthik Gomadam, Ajith Ranabahu, Lakshmish Ramaswa...
EDOC
2006
IEEE
13 years 11 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
13 years 10 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker