Sciweavers

1256 search results - page 85 / 252
» A Simple E-Voting Protocol
Sort
View
132
Voted
WICSA
2004
15 years 5 months ago
An Architectural Approach to Mobility - The Handover Case Study
COMMUNITY is a formal approach to software architecture. Its main characteristics are: a precise, yet intuitive mathematical semantics based on categorical diagrams; a clear separ...
Cristóvão Oliveira, Michel Wermeling...
MONET
2002
117views more  MONET 2002»
15 years 4 months ago
A Service Management Framework for M-Commerce Applications
Mobile commerce (m-commerce) refers to an ability to conduct wireless commerce transactions using mobile applications in mobile devices. M-commerce applications can range from as s...
Gary Shih, Simon S. Y. Shim
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
CIMCA
2008
IEEE
15 years 11 months ago
Collective Operations as Building Blocks for Agent Cooperation
Cooperation is the process of synchronization and exchanging useful knowledge between agents in multiagent systems. Since cooperation associates agents into a collaborative team t...
Nguyen Tuan Duc, Ikuo Takeuchi
ICC
2007
IEEE
142views Communications» more  ICC 2007»
15 years 11 months ago
Filtering Spam Email Based on Retry Patterns
— A central problem in today’s Internet is unsolicited bulk email: spam. The SMTP protocol lacks a mechanism for verifying the source of a message, and respective protocol exte...
Peter Lieven, Björn Scheuermann, Michael Stin...