Sciweavers

14824 search results - page 2561 / 2965
» Security - Introduction
Sort
View
AAECC
2006
Springer
135views Algorithms» more  AAECC 2006»
15 years 9 months ago
Applying Fujisaki-Okamoto to Identity-Based Encryption
The Fujisaki-Okamoto (FO) conversion is widely known to be able to generically convert a weak public key encryption scheme, say one-way against chosen plaintext attacks (OW-CPA), t...
Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka...
ACNS
2006
Springer
78views Cryptology» more  ACNS 2006»
15 years 9 months ago
DSO: Dependable Signing Overlay
Dependable digital signing service requires both high fault-tolerance and high intrusion-tolerance. While providing high fault-tolerance, existing approaches do not satisfy the hig...
Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Bl...
ACMICEC
2006
ACM
215views ECommerce» more  ACMICEC 2006»
15 years 9 months ago
Economics of online music and consumer behavior
In this paper we first provide a literature review about the economics of online music. Second, we then present an economical model for online music by incorporating various param...
Marc Fetscherin
ACMSE
2006
ACM
15 years 9 months ago
Using an end-to-end demonstration in an undergraduate grid computing course
In this paper, we describe a demonstration called an “End-to-End” demonstration developed for the 2005 offering of our grid computing course that was taught across the State o...
Mark A. Holliday, Barry Wilkinson, James Ruff
APLAS
2006
ACM
15 years 9 months ago
A Practical String Analyzer by the Widening Approach
The static determination of approximated values of string expressions has many potential applications. For instance, approximated string values may be used to check the validity an...
Tae-Hyoung Choi, Oukseh Lee, Hyunha Kim, Kyung-Goo...
« Prev « First page 2561 / 2965 Last » Next »