Sciweavers

5324 search results - page 693 / 1065
» Internet Security Protocols
Sort
View
176
Voted
ESORICS
2012
Springer
13 years 7 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
WWW
2006
ACM
16 years 5 months ago
Semantic WS-agreement partner selection
In a dynamic service oriented environment it is desirable for service consumers and providers to offer and obtain guarantees regarding their capabilities and requirements. WS-Agre...
Nicole Oldham, Kunal Verma, Amit P. Sheth, Farshad...
WWW
2005
ACM
16 years 5 months ago
A language for expressing user-context preferences in the web
In this paper, we introduce WPML (WebProfiles Markup Language) for expressing user-context preferences information in the Web. Using WPML a service provider can negotiate and obta...
Diego López de Ipiña, Juan Ignacio V...
128
Voted
WWW
2003
ACM
16 years 5 months ago
A Multicast-On-Large-Demand Approach to the Flash Crowd Problem
In this paper we propose a multicast-on-large-demand (MOLD) approach to the flash crowd problem. A MOLD Web server may dynamically open a multicast channel for resources when dete...
Rocky K. C. Chang
ESWS
2009
Springer
15 years 11 months ago
Who the Heck Is the Father of Bob?
Abstract. Finding the optimal selection of an OWL reasoner and service interface for a specific ontology-based application is challenging. Over time it has become more and more di...
Marko Luther, Thorsten Liebig, Sebastian Böhm...