Sciweavers

610 search results - page 91 / 122
» Information-theoretically secure protocols and security unde...
Sort
View
HPDC
1999
IEEE
15 years 4 months ago
The UNICORE Architecture Seamless Access to Distributed Resources
Seamless access to different systems of different vendors at different sites is an important prerequisite to effective and efficient use of distributed resources. Learning about n...
Mathilde Romberg
CRITIS
2006
15 years 3 months ago
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures....
Cristina Alcaraz, Rodrigo Roman
DRMTICS
2005
Springer
15 years 1 months ago
A Novel Framework for Multiple Creatorship Protection of Digital Movies
A digital movie can be created jointly under the cooperation of many creators. It is then necessary to provide protection to the creatorship of each participating creator. In this ...
Yu-Quan Zhang, Sabu Emmanuel
JALC
2006
61views more  JALC 2006»
14 years 11 months ago
Random Polynomial-Time Attacks and Dolev-Yao Models
In this paper we present an extension of Dolev-Yao models for security protocols with a notion of random polynomial-time (Las Vegas) computability. First we notice that Dolev-Yao ...
Mathieu Baudet
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
14 years 9 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier