Sciweavers

123 search results - page 22 / 25
» Composable Security in the Bounded-Quantum-Storage Model
Sort
View
ICWS
2009
IEEE
15 years 6 months ago
Integrating Behavioral Trust in Web Service Compositions
Algorithms for composing Web services (WS) traditionally utilize the functional and quality-of-service parameters of candidate services to decide which services to include in the ...
Sharon Paradesi, Prashant Doshi, Sonu Swaika
VIS
2007
IEEE
164views Visualization» more  VIS 2007»
15 years 10 months ago
Contextualized Videos: Combining Videos with Environment Models to Support Situational Understanding
Multiple spatially-related videos are increasingly used in security, communication, and other applications. Since it can be difficult to understand the spatial relationships betwee...
Yi Wang, David A. Krum, Enylton M. Coelho, Doug...
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan
ICEIS
2005
IEEE
15 years 3 months ago
Conditions for Interoperability
Abstract: Interoperability for information systems remains a challenge both at the semantic and organisational levels. The original three-level architecture for local databases nee...
B. Nick Rossiter, Michael A. Heather
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
15 years 9 months ago
Non-interactive and reusable non-malleable commitment schemes
We consider non-malleable (NM) and universally composable (UC) commitment schemes in the common reference string (CRS) model. We show how to construct non-interactive NM commitmen...
Ivan Damgård, Jens Groth