Sciweavers

519 search results - page 80 / 104
» How to make secure email easier to use
Sort
View
ECAI
2004
Springer
15 years 3 months ago
An Active, Ontology-driven Network Service for Internet Collaboration
: Web portals have emerged as an important means of collaboration on the WWW, and the integration of ontologies promises to make them more accurate in how they serve users’ colla...
David Lewis, Kevin Feeney, Thanassis Tiropanis, Si...
IFIP
2004
Springer
15 years 3 months ago
Dynamic Typing with Dependent Types
Dependent type systems are promising tools programmers can use to increase the reliability and security of their programs. Unfortunately, dependently-typed programming languages re...
Xinming Ou, Gang Tan, Yitzhak Mandelbaum, David Wa...
93
Voted
ADHOCNETS
2009
Springer
15 years 2 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
EUROCRYPT
2006
Springer
15 years 1 months ago
Perfect Non-interactive Zero Knowledge for NP
Non-interactive zero-knowledge (NIZK) proof systems are fundamental cryptographic primitives used in many constructions, including CCA2-secure cryptosystems, digital signatures, an...
Jens Groth, Rafail Ostrovsky, Amit Sahai
WISTP
2007
Springer
15 years 3 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette