Sciweavers

8009 search results - page 46 / 1602
» cans 2005
Sort
View
FSKD
2005
Springer
78views Fuzzy Logic» more  FSKD 2005»
15 years 5 months ago
Using Feedback Cycle for Developing an Adjustable Security Design Metric
In this paper, we develop a security design metric that can be used at system design time to build more secure systems. This metric is based on the system-wide approach and adopt a...
Charlie Y. Shim, Jung Y. Kim, Sung Y. Shin, Jiman ...
CEEMAS
2005
Springer
15 years 1 months ago
Palpable Computing and the Role of Agent Technology
This paper presents a computing approach, called Palpable Computing, complementing and extending Ambient Computing notions and techniques. The main contribution of this paper lies ...
Giovanni Rimassa, Dominic A. P. Greenwood, Monique...
CMMR
2005
Springer
143views Music» more  CMMR 2005»
15 years 1 months ago
The BRASS Project, from Physical Models to Virtual Musical Instruments: Playability Issues
The Brass project aims to deliver software virtual musical instruments (trumpet, trombone, tenor saxophone) based on physical modelling. This requires to work on some aspects of th...
Christophe Vergez, Patrice Tisserand
AMC
2005
124views more  AMC 2005»
14 years 11 months ago
An efficient undeniable group-oriented signature scheme
Three main methods with favorable security and efficiency can be considered in the design of cryptosystems. These methods are integer factorization systems (of which RSA is the be...
Tzer-Shyong Chen, Jen-Yan Huang, Tzer-Long Chen
AMC
2005
121views more  AMC 2005»
14 years 11 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao