Sciweavers

14824 search results - page 2747 / 2965
» Security - Introduction
Sort
View
112
Voted
CCR
2000
101views more  CCR 2000»
15 years 2 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
137
Voted
CCR
2002
111views more  CCR 2002»
15 years 2 months ago
A taxonomy and design considerations for Internet accounting
Economic principles are increasingly being suggested for addressing some complex issues related to distributed resource allocation for QoS (Quality of Service) enhancement. Many p...
Michel Kouadio, Udo W. Pooch
124
Voted
COMCOM
2000
125views more  COMCOM 2000»
15 years 2 months ago
On object initialization in the Java bytecode
Java is an ideal platform for implementing mobile code systems, not only because of its portability but also because it is designed with security in mind. Untrusted Java programs ...
Stephane Doyon, Mourad Debbabi
97
Voted
DEBU
2000
90views more  DEBU 2000»
15 years 2 months ago
Personal Views for Web Catalogs
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...
Kajal T. Claypool, Li Chen, Elke A. Rundensteiner
117
Voted
CONCURRENCY
2002
122views more  CONCURRENCY 2002»
15 years 2 months ago
The Grid Portal Development Kit
Computational science portals are emerging as useful and necessary interfaces for performing operations on the Grid. The Grid Portal Development Kit (GPDK) facilitates the develop...
Jason Novotny
« Prev « First page 2747 / 2965 Last » Next »