Sciweavers

14824 search results - page 2732 / 2965
» Security - Introduction
Sort
View
ECRA
2007
113views more  ECRA 2007»
15 years 2 months ago
Exclusions and related trust relationships in multi-party fair exchange protocols
Some electronic commerce transactions are inherently performed between more than two parties. In this context, it is thus important to determine whether the underlying fair exchan...
Nicolás González-Deleito, Olivier Ma...
ECRA
2007
73views more  ECRA 2007»
15 years 2 months ago
An innovative revocation scheme for one-to-many E-services
E-service providers usually encrypt each E-service message to prevent unauthorized receivers from reading the content and they change the encryption keys periodically for security...
Ren-Hung Lin, Jinn-ke Jan
JMM2
2006
149views more  JMM2 2006»
15 years 2 months ago
Invariant Robust 3-D Face Recognition based on the Hilbert Transform in Spectral Space
One of the main objectives of face recognition is to determine whether an acquired face belongs to a reference database and to subsequently identify the corresponding individual. F...
Eric Paquet, Marc Rioux
MAGS
2008
169views more  MAGS 2008»
15 years 2 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi
ENTCS
2007
105views more  ENTCS 2007»
15 years 2 months ago
Narrowing and Rewriting Logic: from Foundations to Applications
Narrowing was originally introduced to solve equational E-unification problems. It has also been recognized as a key mechanism to unify functional and logic programming. In both ...
Santiago Escobar, José Meseguer, Prasanna T...
« Prev « First page 2732 / 2965 Last » Next »