Sciweavers

2043 search results - page 251 / 409
» Reasoning About Security Models
Sort
View
116
Voted
ASIACRYPT
2003
Springer
15 years 4 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
171
Voted
SADFE
2008
IEEE
15 years 7 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
144
Voted
GCC
2005
Springer
15 years 6 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
JCIT
2010
130views more  JCIT 2010»
14 years 8 months ago
Research on Simulation and Optimization of Transshipment Port Operation in a Power Coal Ocean Shipping Logistics System on the B
With China's rapid economic development, electricity supply is relatively shortage, and the contradiction of power coal supply and demand is prominent. In this context, using...
Yabin Li
112
Voted
ICCV
2009
IEEE
16 years 6 months ago
Decomposing a Scene into Geometric and Semantically Consistent Regions
High-level, or holistic, scene understanding involves reasoning about objects, regions, and the 3D relationships between them. This requires a representation above the level of ...
Stephen Gould, Richard Fulton, Daphne Koller