Sciweavers

527 search results - page 81 / 106
» Constructing Secure Web Service Based on XML
Sort
View
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
15 years 1 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
CSREAESA
2003
14 years 11 months ago
Designing an Embedded Electronic-Prescription Application for Home-Based Telemedicine Using OSGi Framework?
The combined benefits of Open Services Gateway Initiative (OSGi) and Smart card technologies in embedded devices have made the two technologies suitable for developing middleware ...
Patrick O. Bobbie, Sailaja H. Ramisetty, Abdul-Lat...
GRID
2006
Springer
14 years 9 months ago
Flexible and Secure Logging of Grid Data Access
-- In Grid collaborations, scientists use middleware to execute computational experiments, visualize results, and securely share data on resources ranging from desktop machines to ...
Weide Zhang, David Del Vecchio, Glenn S. Wasson, M...
IJNSEC
2008
88views more  IJNSEC 2008»
14 years 9 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
EUROPAR
2003
Springer
15 years 3 months ago
Delivering Data Management for Engineers on the Grid
Engineering design search and optimisation is a computationally expensive and data intensive process. Grid technology offers great potential to increase the efficiency of this proc...
Jasmin L. Wason, Marc Molinari, Zhuoan Jiao, Simon...