ID-WSF

In computer networking, Identity Web Services Framework is a protocol stack that profiles WS-Security, WS-Addressing, SAML andadds new protocol… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We utilize graphical representations of Dictator Games which generate rich individual-level data. Our baseline experiment employs… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We give the first optimal algorithm for estimating the number of distinct elements in a data stream, closing a long line of… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Flow-based intrusion detection has recently become a promi sing security mechanism in high speed networks (1-10 Gbps). Despit the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
Sakai et. al in 2000 produced a method of construction identity based public/private key pairs using pairings on elliptic curves… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
One of the greatest impediments to the study of Fusarium has been the incorrect and confused application of species names to… (More)
  • figure 1
  • table 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has… (More)
  • table 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this paper we describe the results achieved using the JAM distributed data mining system for the real world problem of fraud… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In an auction with externalities, a buyer's type is multidimensional and specifies the payoff he would get for each of the N+1… (More)
  • figure 1
  • figure 2
Is this relevant?