Sciweavers

50 search results - page 6 / 10
» Coming of Age
Sort
View
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
13 years 10 months ago
Implementing Cryptographic Pairings on Smartcards
Abstract. Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment in new security applications, particularly in the context of implementations...
Michael Scott, Neil Costigan, Wesam Abdulwahab
DFN
2004
13 years 7 months ago
SIP Security
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker
JIPS
2010
150views more  JIPS 2010»
13 years 28 days ago
Fast Fuzzy Control of Warranty Claims System
Classical warranty plans require crisp data obtained from strictly controlled reliability tests. However, in a real situation these requirements might not be fulfilled. In an extre...
Sang-Hyun Lee, Sung-Eui Cho, Kyung-li Moon
DIM
2009
ACM
14 years 20 days ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
ICSM
2003
IEEE
13 years 11 months ago
An Environment for Managing Evolving Product Line Architectures
The use of product lines is recognized as beneficial in promoting and structuring both component and architecture reuse throughout an organization. While the business practices of...
Akash Garg, Matt Critchlow, Ping Chen, Christopher...