Sciweavers

5639 search results - page 832 / 1128
» Timed Abstract Non-interference
Sort
View
ASIACRYPT
2004
Springer
15 years 10 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
ASIASIM
2004
Springer
15 years 10 months ago
Design and Implementation of an SSL Component Based on CBD
Abstract. SSL is one of the most popular protocols used on the Internet for secure communications. However SSL protocol has several problems. First, SSL protocol brings considerabl...
Eun-Ae Cho, Young-Gab Kim, Chang-Joo Moon, Doo-Kwo...
AUSAI
2004
Springer
15 years 10 months ago
Analyzing the Effect of Query Class on Document Retrieval Performance
Abstract. Analysis of queries posed to open-domain question-answering systems indicates that particular types of queries are dominant, e.g., queries about the identity of people, a...
Pawel Kowalczyk, Ingrid Zukerman, Michael Niemann
CD
2004
Springer
15 years 10 months ago
Dynamic Deployment of IIOP-Enabled Components in the JBoss Server
Abstract. JBoss is an extensible Java application server that affords remote access to EJB components via multiple protocols. Its IIOP module supports IIOP-enabled EJBs, which are...
Francisco Reverbel, Bill Burke, Marc Fleury
CIT
2004
Springer
15 years 10 months ago
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder
Abstract. Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. W...
Saraju P. Mohanty, Renuka Kumara C., Sridhara Naya...