Sciweavers

17 search results - page 3 / 4
» The Fundamental Inadequacies of Conventional Public Key Infr...
Sort
View
CSI
2007
91views more  CSI 2007»
13 years 5 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
TC
2008
13 years 5 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
13 years 11 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
NAR
2011
226views Computer Vision» more  NAR 2011»
12 years 8 months ago
The International Nucleotide Sequence Database Collaboration
Under the International Nucleotide Sequence Database Collaboration (INSDC; http://www.insdc. org), globally comprehensive public domain nucleotide sequence is captured, preserved ...
Guy Cochrane, Ilene Karsch-Mizrachi, Yasukazu Naka...
ISQED
2006
IEEE
124views Hardware» more  ISQED 2006»
13 years 11 months ago
DFM Metrics for Standard Cells
Design for Manufacturability (DFM) is becoming increasingly important as process geometries shrink. Conventional design rule pass/fail is not adequate to quantify DFM compliance. ...
Robert C. Aitken