Sciweavers

1612 search results - page 291 / 323
» About models of security protocols
Sort
View
LATINCRYPT
2010
14 years 9 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
EUROCRYPT
2009
Springer
15 years 12 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
ACMICEC
2006
ACM
215views ECommerce» more  ACMICEC 2006»
15 years 5 months ago
Economics of online music and consumer behavior
In this paper we first provide a literature review about the economics of online music. Second, we then present an economical model for online music by incorporating various param...
Marc Fetscherin
SAC
2006
ACM
15 years 5 months ago
STRUDEL: supporting trust in the dynamic establishment of peering coalitions
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...
ATAL
2011
Springer
13 years 11 months ago
Solving Stackelberg games with uncertain observability
Recent applications of game theory in security domains use algorithms to solve a Stackelberg model, in which one player (the leader) first commits to a mixed strategy and then th...
Dmytro Korzhyk, Vincent Conitzer, Ronald Parr