Sciweavers

259 search results - page 15 / 52
» Study of management on the mobile public key infrastructure
Sort
View
ISPA
2007
Springer
15 years 3 months ago
Grid and Distributed Public Computing Schemes for Structural Proteomics: A Short Overview
Grid and distributed public computing schemes has become an essential tool for many scientific fields including bioinformatics, computational biology and systems biology. The adopt...
Azhar Ali Shah, Daniel Barthel, Natalio Krasnogor
IDTRUST
2009
ACM
15 years 4 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
15 years 3 months ago
Explaining ICT Infrastructure and E-Commerce Uses and Benefits in Industrial Clusters: Evidence from a Biotech Cluster
The literature on industrial clusters has not focused heavily on the role of the ICT infrastructure, nor on the potential implications of electronic commerce . In this paper, we e...
Charles Steinfield, Ada Scupola
DSN
2007
IEEE
15 years 3 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
CCS
2008
ACM
14 years 11 months ago
Identity-based encryption with efficient revocation
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key Infrastructure (PKI). Any setting, PKI- or identit...
Alexandra Boldyreva, Vipul Goyal, Virendra Kumar