Sciweavers

4511 search results - page 552 / 903
» Observation Based System Security
Sort
View
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 6 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
MOCOMED
2003
15 years 6 months ago
PDA-based decision support and documentation for transplantation surgery data
: The Transplantation Unit of the Technical University of Munich has developed a mobile, handheld based application for preoperative transplantation patient management. It provides...
Andreas Krause, Alexander T. Mehlhorn, Dominik Har...
ULPAA
1994
120views Hardware» more  ULPAA 1994»
15 years 6 months ago
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
A uniform extension language for email systems can radically extend the utility of electronic mail, simplifying the construction of mail-based services and permitting the delivery...
Nathaniel S. Borenstein
IJNSEC
2008
112views more  IJNSEC 2008»
15 years 4 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
ENTCS
2002
84views more  ENTCS 2002»
15 years 4 months ago
Set Types and Applications
We present pmlB, a programming language that includes primitive sets and associated operations. The language is equipped with a precise type discipline that statically captures dy...
Christian Skalka, Scott F. Smith