Amanote Research

Amanote Research

    RegisterSign In

Secure Encapsulation of Insecure Middleware

doi 10.2991/jcis.2008.113
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2008

Authors
Jian-min ZhaoWei ZhangTian-gei Li
Publisher

Atlantis Press


Related search

Secure Personal Computing in an Insecure Network

Communications of the ACM
Computer Science
1979English

Real-World Decision Making: Logging Into Secure vs. Insecure Websites

2016English

Secure Authentication and Document Signature With Cryptogram Smart Card in an Insecure Environment

2004English

Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman

English

Susceptibility and Resilience to Cyber Threat: Findings From a Scenario Decision Program to Measure Secure and Insecure Computing Behavior

PLoS ONE
Multidisciplinary
2018English

On Constructing Dynamic and Forward Secure Authenticated Group Key Agreement Scheme From Multikey Encapsulation Mechanism

The Scientific World Journal
BiochemistryMedicineGeneticsMolecular BiologyEnvironmental Science
2015English

Middleware of Taiwan UniGrid

2008English

Middleware-Layer Connector Synthesis: Beyond State of the Art in Middleware Interoperability

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Insecure Bodies/Selves: Introduction to Theme Section

Social and Cultural Geography
DevelopmentPlanningCultural StudiesGeography
2014English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy