Sciweavers

14824 search results - page 2722 / 2965
» Security - Introduction
Sort
View
92
Voted
DKE
2006
79views more  DKE 2006»
15 years 2 months ago
The view-based approach to dynamic inter-organizational workflow cooperation
This paper presents a novel approach to inter-organizational workflow cooperation. Our goal is to provide support for organizations which are involved in a shared but not pre-mode...
Issam Chebbi, Schahram Dustdar, Samir Tata
IJACT
2008
136views more  IJACT 2008»
15 years 2 months ago
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
: In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation betw...
Mike Burmester, Breno de Medeiros, Rossana Motta
ENTCS
2006
158views more  ENTCS 2006»
15 years 2 months ago
Towards a Subject-Oriented Model-Driven Framework
Model-Driven Architecture is an approach of the OMG, its objective is to tackle problems such as: the high availability that a software product requires to be ready for use, the h...
Pablo Amaya, Carlos González, Juan M. Muril...
IJNSEC
2008
127views more  IJNSEC 2008»
15 years 2 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
IJNSEC
2008
109views more  IJNSEC 2008»
15 years 2 months ago
A Multi-band Wavelet Watermarking Scheme
This paper presents a new multi-band wavelet watermarking scheme. Compared with conventional watermarking schemes implemented in two-band wavelet domain, by incorporating the prin...
Xiangui Kang, Wenjun Zeng, Jiwu Huang
« Prev « First page 2722 / 2965 Last » Next »