Sciweavers

1102 search results - page 124 / 221
» Distributed Key Generation for the Internet
Sort
View
SWS
2004
ACM
15 years 8 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ECIS
2001
15 years 4 months ago
Embarking on E-Business at Ducati Motorcycles (Italy)
Following its 1996 liquidity crisis, Ducati, an Italian manufacturer of high-performance motorcycles, took several initiatives aiming at strengthening the company brand, enhancing...
Tawfik Jelassi, Stefanie Leenen
CORR
2007
Springer
110views Education» more  CORR 2007»
15 years 3 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
ICIP
2003
IEEE
16 years 4 months ago
Watermarking with knowledge of image database
The goal of this paper is to study how a-prior knowledge of the image database could be exploited for better watermarking performance. Unlike most formulations, where the encoder ...
S. Roy, E.-C. Chang
137
Voted
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 9 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...