Sciweavers

1530 search results - page 208 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
CLEIEJ
2006
169views more  CLEIEJ 2006»
14 years 12 months ago
Tailoring RUP for LMS Selection: A Case Study
Learning Management System (LMS) development has become a high priority project for educational institutions and organizations, as it provides the virtual environment for online e...
Luis Eduardo Mendoza, María A. Pérez...
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
16 years 4 days ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
IPPS
2007
IEEE
15 years 6 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
EIT
2008
IEEE
15 years 1 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
ECIS
2001
15 years 1 months ago
Rethinking competence systems for innovative organizations
Information technology (IT) support for managing competence is based on a rationalistic view of competence. While these competence systems might work in rationalistic organization...
Rikard Lindgren, Dick Stenmark, Magnus Bergquist, ...