Sciweavers

620 search results - page 99 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
80
Voted
TES
2000
Springer
15 years 1 months ago
Active Rules for XML: A New Paradigm for E-Services
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the developme...
Angela Bonifati, Stefano Ceri, Stefano Paraboschi
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 11 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
CCE
2007
14 years 11 months ago
Context-aware Integration of Collaboration Services for the Support of Mobile Field Operations
: This paper describes concepts for using contextual information in an advanced service environment for the support of mobile maintenance processes. We focus on spatio-temporal con...
Heinz-Josef Eikerling, Matthias Benesch, Frank Ber...
ICWS
2008
IEEE
14 years 11 months ago
Communications Semantics for WSBPEL Processes
WSBPEL [2] opens up the possibility of applying a range of formal techniques to the verification of Web service behaviors from two points of view: constraints between activities w...
Walid Fdhila, Mohsen Rouached, Claude Godart
72
Voted
LREC
2008
150views Education» more  LREC 2008»
14 years 11 months ago
The 2008 Oriental COCOSDA Book Project: in Commemoration of the First Decade of Sustained Activities in Asia
The purpose of Oriental COCOSDA is to provide the Asian community a platform to exchange ideas, to share information and to discuss regional matters on creation, utilization, diss...
Shuichi Itahashi, Chiu-yu Tseng