Sciweavers

2560 search results - page 345 / 512
» Securing VO Management
Sort
View
CAISE
2003
Springer
15 years 10 months ago
User Roles in Document Analysis
In a modern business process, documents are important carriers of information between organisations. Document management solutions are increasingly based on structured document for...
Pasi Tiitinen
IWAN
1999
Springer
15 years 9 months ago
The Impact of Active Networks on Established Network Operators
A collaborative case based study has established that Active Networks will have a very significant impact on Network operators. Active Networking appears to be the only route to a...
Arto Juhola, Ian Marshall, Stefan Covaci, Thomas V...
123
Voted
IH
1998
Springer
15 years 9 months ago
Information Hiding to Foil the Casual Counterfeiter
Abstract. Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent a...
Daniel Gruhl, Walter Bender
VLDB
1998
ACM
116views Database» more  VLDB 1998»
15 years 9 months ago
The Heterogeneity Problem and Middleware Technology: Experiences with and Performance of Database Gateways
In this paper, we present the results that we have obtained by comparing and testing three well-known database middleware solutions. We have analyzed their features related to glo...
Fernando de Ferreira Rezende, Klaudia Hergula
ISW
1997
Springer
15 years 9 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel