Sciweavers

3151 search results - page 494 / 631
» Using query term order for result summarisation
Sort
View
130
Voted
MSWIM
2005
ACM
15 years 11 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
EUROPAR
2003
Springer
15 years 10 months ago
On the Characterization of Distributed Virtual Environment Systems
Abstract. Distributed Virtual Environment systems have experienced a spectacular growth last years. One of the key issues in the design of scalable and costeffective DVE systems is...
Pedro Morillo, Juan M. Orduña, Marcos Fern&...
SACMAT
2010
ACM
15 years 10 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
GECCO
2007
Springer
147views Optimization» more  GECCO 2007»
15 years 9 months ago
A comparison of evaluation methods in coevolution
In this research, we compare four different evaluation methods in coevolution on the Majority Function problem. The size of the problem is selected such that an evaluation against...
Ting-Shuo Yo, Edwin D. de Jong
EUROCRYPT
2004
Springer
15 years 9 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin