Sciweavers

3451 search results - page 119 / 691
» Collaborative attack modeling
Sort
View
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
15 years 9 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
CHI
2005
ACM
16 years 2 months ago
Applying the lessons of the attack on the world trade center, 11th September 2001, to the design and use of interactive evacuati
The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public atte...
C. W. Johnson
104
Voted
CAISE
2009
Springer
15 years 9 months ago
Automated Context-Aware Service Selection for Collaborative Systems
Service-Oriented Architecture (SOA) can provide a paradigm for constructing context-aware collaboration systems. Particularly, the promise of inexpensive context-aware collaborat...
HongQing Yu, Stephan Reiff-Marganiec
ACISICIS
2007
IEEE
15 years 8 months ago
Trust Realisation in Multi-domain Collaborative Environments
In the Internet-age, the geographical boundaries that have previously impinged upon inter-organisational collaborations have become decreasingly important. Of more importance for ...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
ICALT
2006
IEEE
15 years 8 months ago
Tuning IMS LD for Implementing a Collaborative Lifelong Learning Scenario
This paper describes an approach for modeling and implementing a collaborative learning situation, which is part of a real lifelong learning scenario in astronomy. We adopt and sl...
Davinia Hernández Leo, Eloy D. Villasclaras...