Sciweavers

8655 search results - page 402 / 1731
» Challenges for Trusted Computing
Sort
View
ICDCS
1998
IEEE
15 years 8 months ago
A Mechanism for Establishing Policies for Electronic Commerce
This paper introduces a mechanism for establishing policies for electronic commerce in a uni ed and secure manner. A commercial policy can be viewed as the embodiment of a contrac...
Naftaly H. Minsky, Victoria Ungureanu
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
15 years 8 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
DAC
2007
ACM
15 years 8 months ago
Simultaneous Multi-Topology Multi-Objective Sizing Across Thousands of Analog Circuit Topologies
This paper presents MOJITO, a system which optimizes across thousands of analog circuit topologies simultaneously, and returns a set of sized topologies that collectively provide ...
Trent McConaghy, Pieter Palmers, Georges G. E. Gie...
ICDS
2007
IEEE
15 years 7 months ago
A Practical Synthesis of Dynamic Role Settings in Telecare Services
- Role provisioning is an essential yet complex aspect of the design of virtual organisations. This paper addresses an even more complex scenario, that of role provisioning in tele...
Ying Liu, Jean Bacon
ACMICEC
2006
ACM
111views ECommerce» more  ACMICEC 2006»
15 years 7 months ago
Passive verification of the strategyproofness of mechanisms in open environments
Consider an open infrastructure in which anyone can deploy mechanisms to support automated decision making and coordination amongst self-interested computational agents. Strategyp...
Laura Kang, David C. Parkes