Sciweavers

1610 search results - page 272 / 322
» Identity Based Multisignatures
Sort
View
DC
2006
14 years 12 months ago
Dynamic group communication
Group communication is the basic infrastructure for implementing fault-tolerant replicated servers. While group communication is well understood in the context of static systems (...
André Schiper
EG
2006
96views more  EG 2006»
14 years 12 months ago
Building Semantic Webs for e-government with Wiki technology
: E-government webs are among the largest webs in existence, based on the size, number of users and number of information providers. Thus, creating a Semantic Web infrastructure to...
Christian Wagner, Karen S. K. Cheung, Rachael Kwai...
FSS
2006
85views more  FSS 2006»
14 years 12 months ago
The logic of tied implications, part 2: Syntax
An implication operator A is said to be tied if there is a binary operation T that ties A; that is, the identity A(a, A(b, z)) = A(T (a, b), z) holds for all a, b, z. We aim at th...
Nehad N. Morsi, Wafik Boulos Lotfallah, Moataz Sal...
IJNSEC
2008
88views more  IJNSEC 2008»
14 years 12 months ago
Security Requirements for RFID Computing Systems
Many security and privacy protocols for RFID systems have been proposed [8, 13, 19, 20]. In most cases these protocols are evaluated in terms of security based on some model. Ofte...
Xiaolan Zhang 0003, Brian King
GRID
2006
Springer
14 years 12 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...