Sciweavers

5246 search results - page 188 / 1050
» Sanitization models and their limitations
Sort
View
EUROCRYPT
2001
Springer
15 years 4 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
APSEC
1998
IEEE
15 years 4 months ago
A Comprehensive Interface Definition Framework for Software Components
Component based software engineering (CBSE) represents an exciting and promising paradigm for software development, attracting much interest and effort from industrial practice an...
Jun Han
DEXAW
1998
IEEE
165views Database» more  DEXAW 1998»
15 years 3 months ago
Event Processing in Mobile and Active Database Systems Using Broadcasts
The integration of active database technology into mobile database systems allows to limit the transfer of data between mobile computers and the stationary network. In order to em...
Stefan Sauer, Olaf Zukunft
COOPIS
2004
IEEE
15 years 3 months ago
Analysis, Transformation, and Improvements of ebXML Choreographies Based on Workflow Patterns
In ebXML the choreography of a business process should be modeled by UMM (UN/CEFACT Modeling Methodology) and is finally expressed in BPSS (Business Process Specification Schema). ...
Ja-Hee Kim, Christian Huemer
CA
1995
IEEE
15 years 3 months ago
Dynamic simulation of splashing fluids
: In this paper we describe a method for modeling the dynamic behavior of splashing fluids. The model simulates the behavior of a fluid when objects impact or float on its surfa...
James F. O'Brien, Jessica K. Hodgins