Sciweavers

5722 search results - page 477 / 1145
» Security Function Interactions
Sort
View
NORDICHI
2004
ACM
15 years 10 months ago
InfoRadar: group and public messaging in the mobile context
Previous research has sought to utilize everyday messaging metaphors, such as the notice board, in location-based messaging systems. Unfortunately, many of the restrictions associ...
Matti Rantanen, Antti Oulasvirta, Jan Blom, Sauli ...
ATAL
2003
Springer
15 years 10 months ago
Self-Organisation: Paradigms and Applications
Abstract. A self-organising system functions without central control, and through contextual local interactions. Components achieve a simple task individually, but a complex collec...
Giovanna Di Marzo Serugendo, Noria Foukia, Salima ...
ICSE
1999
IEEE-ACM
15 years 9 months ago
Avoiding Packaging Mismatch with Flexible Packaging
To integrate a software component into a system, it must interact properly with the system's other components. Unfortunately,the decisions about how a component is to interac...
Robert DeLine
ESORICS
2009
Springer
16 years 5 months ago
Formal Indistinguishability Extended to the Random Oracle Model
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...
Cristian Ene, Yassine Lakhnech, Van Chan Ngo
ASIACRYPT
2009
Springer
15 years 11 months ago
A Framework for Universally Composable Non-committing Blind Signatures
A universally composable (UC) blind signature functionality requres users to commit to the message to be blindly signed. It is thereby impossible to realize in the plain model. Th...
Masayuki Abe, Miyako Ohkubo