Sciweavers

6555 search results - page 1056 / 1311
» Secure attribute-based systems
Sort
View
108
Voted
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
15 years 10 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
MCAM
2007
Springer
115views Multimedia» more  MCAM 2007»
15 years 10 months ago
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical an...
Tiejun Huang
PKC
2007
Springer
117views Cryptology» more  PKC 2007»
15 years 10 months ago
Identity-Based Traitor Tracing
We present the first identity-based traitor tracing scheme. The scheme is shown to be secure in the standard model, assuming the bilinear decision Diffie-Hellman (DBDH) is hard in...
Michel Abdalla, Alexander W. Dent, John Malone-Lee...
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
15 years 10 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...
ICAS
2006
IEEE
145views Robotics» more  ICAS 2006»
15 years 10 months ago
A Model-Driven Development Framework for Non-Functional Aspects in Service Oriented Grids
Service-oriented grids are grid computing systems built with the notion of service-oriented architecture (SOA). Using two maract concepts, services and connections between service...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
« Prev « First page 1056 / 1311 Last » Next »