Sciweavers

7557 search results - page 1411 / 1512
» Modeling Timed Concurrent Systems
Sort
View
EEE
2004
IEEE
15 years 5 months ago
Value-Based Design of Collaboration Processes for e-Commerce
Designing cross-organizational e-business applications faces the problem that the collaborating businesses must align their commercial interests without any central decision makin...
Pascal van Eck, Jaap Gordijn, Roel Wieringa
ERCIMDL
2006
Springer
161views Education» more  ERCIMDL 2006»
15 years 5 months ago
Scalable Semantic Overlay Generation for P2P-Based Digital Libraries
The advent of digital libraries along with the tremendous growth of digital content call for distributed and scalable approaches for managing vast data collections. Peer-to-peer (P...
Christos Doulkeridis, Kjetil Nørvåg, ...
ETRICS
2006
15 years 5 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 5 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
ACSAC
2001
IEEE
15 years 5 months ago
A JCA-Based Implementation Framework for Threshold Cryptography
The Java Cryptography Architecture, JCA in short, was created to allow JCA-compliant cryptography providers to be plugged into a JCA-aware application at run time. This configurab...
Yih Huang, David Rine, Xunhua Wang
« Prev « First page 1411 / 1512 Last » Next »