Sciweavers

3638 search results - page 236 / 728
» Distribution chain security
Sort
View
CORR
2004
Springer
108views Education» more  CORR 2004»
15 years 5 months ago
Pervasive Service Architecture for a Digital Business Ecosystem
In this paper we present ideas and architectural principles upon which we are basing the development of a distributed, open-source infrastructure that, in turn, will support the ex...
Thomas Heistracher, Thomas Kurz, Claudius Masuch, ...
CASES
2010
ACM
15 years 3 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
ESORICS
2002
Springer
16 years 5 months ago
Outbound Authentication for Programmable Secure Coprocessors
A programmable secure coprocessor platform can help solve many security problems in distributed computing. However, these solutions usually require that coprocessor applications be...
Sean W. Smith
SUTC
2006
IEEE
15 years 11 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
UAI
2000
15 years 6 months ago
Compact Securities Markets for Pareto Optimal Reallocation of Risk
The securities market is the fundamental theoretical framework in economics and finance for resource allocation under uncertainty. Securities serve both to reallocate risk and to ...
David M. Pennock, Michael P. Wellman