Sciweavers

SDMW
2004
Springer
13 years 10 months ago
Using Delay to Defend Against Database Extraction
For many data providers, the “crown jewels” of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive cata...
Magesh Jayapandian, Brian D. Noble, James W. Micke...
WECWIS
2005
IEEE
103views ECommerce» more  WECWIS 2005»
13 years 10 months ago
An Auction for Scheduling Delivery of Highly Demanded Products
We present a simple auction protocol for the sale of overdemanded goods with a delivery schedule. Under some reasonable assumptions, our mechanism is incentive compatible, collect...
Sameer Korrapati, Peter R. Wurman
AAECC
2007
Springer
105views Algorithms» more  AAECC 2007»
13 years 11 months ago
On Non-randomness of the Permutation After RC4 Key Scheduling
Abstract. Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) by...
Goutam Paul, Subhamoy Maitra, Rohit Srivastava