Sciweavers

620 search results - page 60 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
SPC
2005
Springer
15 years 3 months ago
Ephemeral Pairing on Anonymous Networks
The ephemeral pairing problem requires two or more specific physical nodes in a wireless broadcast network, that do not yet know each other, to establish a short-term relationship...
Jaap-Henk Hoepman
APSEC
2000
IEEE
15 years 2 months ago
An adaptive distributed workflow system framework
Workflow management systems are increasingly used to assist the automation of business processes that involve the exchange of documents, information, or task execution results. Re...
Martin K. Purvis, Maryam Purvis, Selena Lemalu
ARITH
1999
IEEE
15 years 2 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter
CSCWD
2008
Springer
14 years 11 months ago
Collaboration in scientific visualization
This paper discusses the key collaborative features of scientific visualization systems. An experiment with several groups of users has been conducted to evaluate the usability an...
Steve Casera, Peter Kropf
IJMSO
2008
135views more  IJMSO 2008»
14 years 9 months ago
An argumentation framework based on confidence degrees to combine ontology mapping approaches
: Ontology mapping has a key importance for applications such as information retrieval, database integration, and agent-communication. This paper presents an Argumentation Framewor...
Cássia Trojahn dos Santos, Paulo Quaresma, ...