Sciweavers

4305 search results - page 635 / 861
» Analysing Protocol Implementations
Sort
View
AP2PC
2005
Springer
15 years 10 months ago
Incentive-Compatibility in a Distributed Autonomous Currency System
Peer-to-peer complementary currencies can be powerful tools for promoting exchanges and building sustainable relationships among selfish peers on the Internet. i-WAT[10] is a prop...
Kenji Saito, Eiichi Morino, Jun Murai
ESORICS
2005
Springer
15 years 10 months ago
Privacy Preserving Clustering
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together...
Somesh Jha, Louis Kruger, Patrick McDaniel
FCT
2005
Springer
15 years 10 months ago
Almost Optimal Explicit Selectors
We understand selection by intersection as distinguishing a single element of a set by the uniqueness of its occurrence in some other set. More precisely, given two sets A and B, i...
Bogdan S. Chlebus, Dariusz R. Kowalski
VIZSEC
2005
Springer
15 years 10 months ago
Visualization of Automated Trust Negotiation
We have designed an interactive visualization framework for the automated trust negotiation (ATN) protocol and we have implemented a prototype of the visualizer in Java. This fram...
Danfeng Yao, Michael Shin, Roberto Tamassia, Willi...
CHI
2004
ACM
15 years 10 months ago
Collections: flexible, essential tools for information management
While collections—aggregation mechanisms such as folders, buddy lists, photo albums, etc.—clearly play a central role in information management, the potential benefits of true...
David R. Karger, Dennis Quan