Search
Now showing items 1-4 of 4
Indirect key derivation schemes for key management of access hierarchies
(2004)
In this thesis, we study the problem of key management within an access
hierarchy. Our contribution to the key management problem is an indirect
key derivation approach we call the HMAC-method. It is called the
HMAC-method, ...
A classification study of rough sets generalization
(2004)
In the development of rough set theory, many different interpretations and formulations
have been proposed and studied. One can classify the studies of rough
sets into algebraic and constructive approaches. While algebraic ...
Web services - agent based model for inter-enterprise collaboration
(2004)
Web Services technology is an emerging paradigm in establishing a standard environment
for legacy applications integration over the Internet. Using Web services and
related technologies facilitate the implementation of ...
Designing a secure ubiquitous mammography consultation system
(2004)
This thesis attempts to design and develop a prototype for mammography image
consultation that can work securely within a ubiquitous environment. Mammogram images
differ largely from other type of images and it requires ...