Sciweavers

1583 search results - page 117 / 317
» The Quorum Deployment Problem
Sort
View
93
Voted
WISE
2007
Springer
15 years 9 months ago
Privacy Inspection and Monitoring Framework for Automated Business Processes
More and more personal data is exposed to automatic and programmatic access, making it more difficult to safeguard the personal information from unauthorised access at every step. ...
Yin Hua Li, Hye-Young Paik, Jun Chen
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 9 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
103
Voted
ECUMN
2007
Springer
15 years 9 months ago
Multicast Extension of Unicast Charging for QoS Services
In order to successfully deploy multicast services in QoS-aware networks, pricing architectures must take into account the particular characteristics of multicast sessions. With t...
Antonio Bueno, Pere Vilà, Ramón Fabr...
101
Voted
ICCS
2007
Springer
15 years 9 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong
124
Voted
ICCS
2007
Springer
15 years 9 months ago
Dynamic Data-Driven Systems Approach for Simulation Based Optimizations
Abstract. This paper reviews recent developments in our project that are focused on dynamic data-driven methods for efficient and reliable simulation based optimization, which may...
Tahsin M. Kurç, Xi Zhang, Manish Parashar, ...