Sciweavers

6555 search results - page 1077 / 1311
» Secure attribute-based systems
Sort
View
111
Voted
IJOE
2008
107views more  IJOE 2008»
15 years 3 months ago
SOA Meets Robots - A Service-Based Software Infrastructure for Remote Laboratories
With the ongoing internationalization of virtual laboratories, the integration of such infrastructures becomes more important. The meanwhile commonly accepted 'glue' for...
Peter Tröger, Andreas Rasche, Frank Feinbube,...
118
Voted
IJSN
2008
90views more  IJSN 2008»
15 years 3 months ago
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
: In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh network...
Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho,...
125
Voted
JCP
2006
135views more  JCP 2006»
15 years 3 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon
109
Voted
ENTCS
2007
121views more  ENTCS 2007»
15 years 3 months ago
Audit-Based Access Control for Electronic Health Records
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the secu...
M. A. C. Dekker, Sandro Etalle
127
Voted
TASE
2008
IEEE
15 years 3 months ago
Perspectives in Probabilistic Verification
Soon after the birth of the flourishing research area of model checking in the early eighties, researchers started to apply this technique to finite automata equipped with probabi...
Joost-Pieter Katoen
« Prev « First page 1077 / 1311 Last » Next »