Sciweavers

507 search results - page 44 / 102
» The XTR Public Key System
Sort
View
113
Voted
GIS
2010
ACM
14 years 10 months ago
Moving forward: location privacy and location awareness
ended abstract looks forward at which shared concepts and approaches are shaping future research in the field of location privacy, as well as reflecting on the broader achievement...
Matt Duckham
119
Voted
CSREASAM
2009
14 years 10 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong
88
Voted
EUROPKI
2004
Springer
15 years 4 months ago
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments
Abstract. A substantial number of micropayment schemes in the literature are based on distributing the cost of a digital signature over several successive micropayments (e.g. Paywo...
Josep Domingo-Ferrer
120
Voted
TCS
2008
15 years 21 days ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
101
Voted
HICSS
2007
IEEE
157views Biometrics» more  HICSS 2007»
15 years 7 months ago
E-Government Evaluation: Reflections On Three Organisational Case Studies
The deployment of e-Government continues at a significant cost and pace in the worldwide public sector. An important area of research is that of the evaluation of e-Government. In...
Stephen Jones, Zahir Irani, Amir M. Sharif