Sciweavers

989 search results - page 156 / 198
» An information-based model for trust
Sort
View
80
Voted
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 4 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
100
Voted
SAC
2000
ACM
15 years 3 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
104
Voted
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 2 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena
100
Voted
FC
1997
Springer
107views Cryptology» more  FC 1997»
15 years 2 months ago
An Efficient Micropayment System Based on Probabilistic Polling
Existing software proposals for electronic payments can be divided into "on-line" schemes that require participation of a trusted party (the bank) in every transaction an...
Stanislaw Jarecki, Andrew M. Odlyzko
IADIS
2004
15 years 10 days ago
Marketing capability and E-business performance: a case study of a retail bank
This paper addresses the significance of marketing capability for e-business performance in retail banking. A conceptual framework was built on the marketing and strategic managem...
Helena Ahola, Johanna Ahola