Sciweavers

342 search results - page 42 / 69
» Reuse, Standardization, and Transformation of Requirements
Sort
View
CASE
2011
102views more  CASE 2011»
13 years 9 months ago
Towards an automated verification process for industrial safety applications
— Legacy systems that do not conform to the norms and regulations imposed by recent safety standards have to be upgraded to meet safety requirements. In this paper, we describe a...
Kleanthis Thramboulidis, Doaa Soliman, Georg Frey
CISIM
2007
IEEE
15 years 4 months ago
Universally Composable Key-Evolving Signature
The standard digital signature scheme can be easily subject to key exposure problem In order to overcome this problem; a feasible and effective approach is employed by key-evolving...
Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 4 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
ISCAS
2005
IEEE
190views Hardware» more  ISCAS 2005»
15 years 3 months ago
Using CLNS for FFTs in OFDM demodulation of UWB receivers
— The Complex Logarithmic Number System (CLNS) uses log/polar complex representation. We propose CLNS for the 128-point Fast Fourier Transform (FFT) in Orthogonal Frequency Divis...
Panagiotis D. Vouzis, Mark G. Arnold, Vassilis Pal...
BPM
2005
Springer
173views Business» more  BPM 2005»
15 years 3 months ago
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...
Rainer Anzböck, Schahram Dustdar