Sciweavers

2421 search results - page 184 / 485
» Message from the Editor-in-Chief
Sort
View
95
Voted
POLICY
2009
Springer
15 years 8 months ago
Abductive Authorization Credential Gathering
A central task in the context of logic-based decentralized authorization languages is that of gathering credentials from credential providers, required by the resource guard’s p...
Moritz Y. Becker, Jason F. Mackay, Blair Dillaway
124
Voted
AINA
2007
IEEE
15 years 8 months ago
Building Web-Base SIP Analyzer with Ajax Approach
Web applications are generally less interactive than desktop applications. Due to the simple request-response model between web browsers and web servers, users usually experience ...
Quincy Wu, Yan-Hsiang Wang
90
Voted
ER
2005
Springer
121views Database» more  ER 2005»
15 years 7 months ago
Agent Oriented Data Integration
Abstract. Data integration is the process by which data from heterogeneous data sources are conceptually integrated into a single cohesive data set. In recent years agents have bee...
Avigdor Gal, Aviv Segev, Christos Tatsiopoulos, Ko...
124
Voted
IPSN
2003
Springer
15 years 7 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
CHES
2006
Springer
105views Cryptology» more  CHES 2006»
15 years 5 months ago
Power Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 216 +1, and when the classical exponent randomization is used. This attack works ...
Pierre-Alain Fouque, Sébastien Kunz-Jacques...