Sciweavers

3811 search results - page 719 / 763
» The Safe-Tcl Security Model
Sort
View
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
15 years 29 days ago
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icart's deterministic enco...
Eric Brier, Jean-Sébastien Coron, Thomas Ic...
CORR
2010
Springer
89views Education» more  CORR 2010»
14 years 12 months ago
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
124views Education» more  CORR 2010»
14 years 12 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
CORR
2008
Springer
107views Education» more  CORR 2008»
14 years 12 months ago
A Computational Framework for the Near Elimination of Spreadsheet Risk
We present Risk Integrated's Enterprise Spreadsheet Platform (ESP), a technical approach to the near-elimination of spreadsheet risk in the enterprise computing environment, ...
Yusuf Jafry, Fredrika Sidoroff, Roger Chi
DSS
2008
97views more  DSS 2008»
14 years 12 months ago
On supply chain cash flow risks
This study models the supply chain related cash flow risks for a business entity measured by the standard deviations of cash inflows, outflows, and netflows of each period in a pl...
Chih-Yang Tsai